OS sse

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/168

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

169 Terms

1
New cards

are rigid metal or glass platters covered with magnetic recording material.

Disks

2
New cards

In a disk the information is recorded on the __

surface

3
New cards

It is a way to read and write data on disks, where the density of bits (bits/unit length) per track is uniform.

Constant Linear Velocity

4
New cards

It is the time it takes to actually transfer data between disk and main memory.

Transfer time

5
New cards

A _ has a separate read-write head for each track.

Fixed-head system

6
New cards

Each disk platter has a flat _ shape, like a phonograoh record.

circular

7
New cards

The system stores information by recording it on the sector under the read-write head.

magnetically

8
New cards

Which of the given is considered aspects of disk management for which an operating system is responsible.

all of these (Booting from disk, Bad-block recovery, disk formatting)

9
New cards

A typical hard disk have a rotation speed from __

4500 to 7200

10
New cards

Modern disks are addressed as large one-dimensional arrays of logical blocks, where the is the smallest unit of transfer.

logical block

11
New cards

Since most jobs depend heavily on the disk for loading and input and output files, it is important that disk service be as fast as possible.

True

12
New cards

In C-SCAN scheduling, when it reaches the other end, it immediately returns to the beginning of the disk without servicing any requests on the return trip.

True

13
New cards

The OS can improve on the average disk service time by scheduling the requests for disk access.

True

14
New cards

C-SCAN scheduling essentially treats the disk as though it were circular where the last track is adjacent to the first one.

True

15
New cards

The First Come First Served disk scheduling selects the request according to the order in the disk queue

True

16
New cards

It provides the bulk of secondary storage for modern computer systems.

Magnetic Disk

17
New cards

A disk normally has a device _ indicating which files are on the disk.

directory

18
New cards

A disk system has several disk platters.

Magnetic

19
New cards

These disks are coated with a hard surface, so the read-write head scans it directly on the disk surface without destroying the data.

floppy disks

20
New cards

The disk surface is logically divided into _, which are subdivided into sectors.

tracks

21
New cards

It is a way to read and write data on disks, where the number of bits per track is uniform (constant number of sectors).

Constant Angular Velocity

22
New cards

_ was used as an early secondary-storage medium, but the access time is much slower than for disks.

Magnetic Tape

23
New cards

LOOK disk scheduling algorithm is sometimes called the elevator algorithm

F (SCAN)

24
New cards

The Shortest Seek Time First disk scheduling selects the request with the maximum seek time from the current head position.

F (minimum)

25
New cards

A movable-head system has only one read-write head per surface and the system moves the head to access a particular track

Movable-Head system

26
New cards

It is the time it takes for the sector to rotate under the head.

Latency time

27
New cards

The main requirement of secondary storage is to be able to store very large amount of data _

permanently

28
New cards

One or more blocks that are unreadable or not writable

Bad block

29
New cards

It is the time it takes to move the read-write head to the correct track.

Seek time

30
New cards

An incident where the head contacts the disk surface, the head will scrape the recording medium off the disk.

Head crashes

31
New cards

The size of a logical block is usually ____ bytes.

512

32
New cards

The Look disk scheduling selects the request with the minimum seek time from the current head position.

F (SSTF)

33
New cards

The Shortest Seek Time First disk scheduling selects the request with the minimum seek time from the current head position.

True

34
New cards

“Recovery of essential and full services after attack” is described as _.

Strategies for limiting damage

35
New cards

Computer “Virus” is a vulnerability of Single Computer (without E-mail or internet)

True

36
New cards

Windows 10 is an example of hand-held operating system

F (not an example)

37
New cards

“Sniffers” is a vulnerability of a LAN connected (with internet).

F ( without internet )

38
New cards

__ plays a key role in computer system security.

Operating System

39
New cards

Which of the following example strategies belong to the key property “Adaptation and evolution to reduce effectiveness of future attacks”?

intrusion recognition patterns

40
New cards

“E-mail” is a vulnerability of which configuration?

LAN connected (with internet)

41
New cards

“Adaptation and evolution to reduce effectiveness of future attacks” is described as_.

Strategies for improving system survivability based on knowledge retrieved from attacks.

42
New cards

Which among the given is a vulnerability of a single computer without e-mail or internet?

Compressed Passwords

43
New cards

LAN connected (without internet) is vulnerable to “sniffers”.

True

44
New cards

Infects files on the computer, normally executable files (.exe and .com) commonly found on Microsoft operating systems.

File infector virus

45
New cards

Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source.

True

46
New cards

Ransomware is a malware that demands a fee or ransom.

True

47
New cards

Small programs written to alter the way a computer operates, without permission of the user.

Virus

48
New cards

Antivirus softwares combat viruses.

True

49
New cards

Hardware malfunction is an example of:

unintentional Intrusion

50
New cards

Spear-phishing is variation of phishing In which the phishier sends fake emails to a certain employee of an organization.

True

51
New cards

Blended threats are considered as intentional attacks.

True

52
New cards

Ransomware is similar to smishing except that the victims receive a voice mail telling them to call a phone number or access a website.

F (vishing)

53
New cards

Spoofing can be applied to emails, phone calls, and websites

True

54
New cards

The more complex and powerful the , the more likely it is to have vulnerabilities to attack.

operating System

55
New cards

Which of the following example strategies does not belong to the key property “Recover of essential and full services after attack”?

all of these (intrusion detection, authentication, encryption)

56
New cards

“Recognition of attacks and damage” is described as .

Strategies for detecting attacks

57
New cards

LAN connected (without internet) is vulnerable to “spoofing”.

True

58
New cards

“E-mail” is a vulnerability of LAN connected (with internet).

True

59
New cards

Which of the given is an example strategy of the key property “Resistance to attacks”?

authentication

60
New cards

Which among the given is not a vulnerability of a LAN connected without internet?

E-mail

61
New cards

What is the “Relative risk” of a LAN connected without internet?

medium

62
New cards

What is the “Relative risk” of a LAN connected with internet?

High

63
New cards

Infects the boot record, the system area of a floppy disk or a hard drive.

Boot sector virus

64
New cards

To be called a virus, one must be self-executing and __.

Self-replicating

65
New cards

Which of the following is an example of an intentional attack?

all of these (Blended Threats, Trojan Horses, Viruses and worms)

66
New cards

Works by attaching itself to a template (such as NORMAL.DOT), which in turn is attached to word processing documents.

Macro Virus

67
New cards

Firewalls are important for security.

True

68
New cards

Any breach of security or modification of data that was not the result of a planned intrusion.

unintentional intrusions

69
New cards

Antivirus software can remove all impurities from your computer.

False (can not)

70
New cards

This infects the boot record of a disk, saving a legitimate copy of the master boot record in a different location on the volume.

Master boot record virus

71
New cards

Refers to the use of discarded materials such as disks, CDs, printout, etc., to enter the system legally.

Trash Collection

72
New cards

Hoax Sites are used when unauthorized users want to disguise themselves as friendly sites.

True

73
New cards

Which among the given is not a vulnerability of a single computer without e-mail or internet?

Sniffers

74
New cards

What is the “ease of protection” of a LAN connected with internet?

low

75
New cards

What is the “Relative risk” of a single computer without e-mail or internet?

low

76
New cards

Which of the configurations is vulnerable to “Spoofing”?

LAN connected with or without Internet

77
New cards

___ must be on guard to arm their operating systems with all available defense against attack

System Administrators

78
New cards

Which of these are the key properties of a survivable system?

all of the above (Recovery of essential services after an attack, Resistance to attacks, Recognition of attacks and resulting damage)

79
New cards

It is when an unauthorized users gain access to search through secondary storage directories or files for information they should not have the privilege to read.

Browsing

80
New cards

A type of virus which is triggered by a specific time

Time Bomb

81
New cards

Spooping is the act of disguising a communication from an unknown source as being from a known, trusted source.

F (Spoofing)

82
New cards

Which of the configurations is vulnerable to “Sniffers”?

LAN connected with or without Internet

83
New cards

“Resistance to attacks” is the same as _.

Strategies for repelling attacks

84
New cards

Which of the following example strategies does not belong to the key property “Resistance to attacks”?

intrusion detection

85
New cards

Which among the given is a vulnerability of a LAN connected with internet?

all of these (E-mail, Spoofing, Viruses)

86
New cards

Written policies and procedures and _ user training are essential elements of system management

regular

87
New cards

Which of the given is an example of unintentional attack?

Hardware malfunction

88
New cards

__ are programs that reside on computers attached to the network.

none of the these (must be sniffers)

89
New cards

Sniffers are programs that reside on computer attached to the network

True

90
New cards

Vishing is a type of phishing that involves the use of short messages service (SMS) texting.

F (smishing)

91
New cards

What is the “ease of protection” of a LAN connected without Internet?

Medium

92
New cards

Which of the given is an example strategy of the key property “Recover of essential and full services after attack”?

contingency planning

93
New cards

Which of the given is an example strategy of the key property “Recognition of attack and damage”?

intrusion detection

94
New cards

Any vulnerability at the _ level opens the entire system to attack.

operating system

95
New cards

virus” is a vulnerability of which configuration?

all of these (Single Computer (without E-mail or internet), Laptop with E-mail, LAN connected with internet)

96
New cards

Which of the following example strategies does not belong to the key property “Recovery of essential and full services after attack”?

authentication

97
New cards

_ is one in which a malicious hacker takes over computers via the internet and causes them to flood a target site with demands for data and other small tasks causing a computer to perform repeated unproductive task.

Denial of Service (DoS) attack

98
New cards

A type of virus which is triggered by a certain event like keystroke

Logic Bomb

99
New cards

Infects data files (such as word processing documents, spreadsheets, etc.)

Macro Virus

100
New cards

These refer to entering systems by guessing authentic passwords.

Repeated trials