How can protection improve the reliability of a system? Ans✓✓✓-By detecting
errors at the interfaces between component subsystems
How do code editors and code compilers usually access files? Ans✓✓✓-
Sequential access
How do policies and mechanisms differ? Ans✓✓✓-Policies may change from
place to place whereas mechanisms remain the same.
How is the array of logical blocks mapped onto the hard disk? Ans✓✓✓-Onto the
sectors of the disk sequentially
In Windows, what represents the shared-memory object that will enable
communication between
processes? Ans✓✓✓-A memory-mapped file
Several major retail chains are hacked and customer information is stolen,
including credit card numbers.
Which type of attack has occurred? Ans✓✓✓-Breach of confidentiality
What are two key types of access permissions? Ans✓✓✓-Append & List
What are two valid components of a process control block (PCB)? Ans✓✓✓-The
process counter & The process state
, What can be assigned roles when using role-based access control? Ans✓✓✓-The
program & The process
What does the 50-percent rule of memory fragmentation state when allocating
additional memory using the
first-fit method? Ans✓✓✓-One-third of all memory may be unused.
What is a benefit of creating a separate raw partition for use as swap space?
Ans✓✓✓-It is optimized for speed of access.
What is a benefit of using virtual memory? Ans✓✓✓-System libraries can be
shared.
What is a difference between soft and hard processor affinity? Ans✓✓✓-Hard
affinity specifies a subset of processors on which a process may run, whereas
soft affinity leaves the processor selection to the OS.
What is a disadvantage of booting an OS stored in ROM? Ans✓✓✓-Changing a
bootstrap requires new hardware chips.
What is a limitation of swapping on mobile systems? Ans✓✓✓-Applications that
fail to free up sufficient memory are terminated.
What is a non-self-modifying code that never changes during execution?
Ans✓✓✓-Reentrant