Exam 3: Process Description and Control

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

System access threats fall into two general categories: __________ and malicious software.

Free
(Short Answer)
4.7/5
(37)
Correct Answer:
Verified

intruders

An IDS comprises three logical components: sensors, __________, and user interface.

Free
(Short Answer)
4.8/5
(41)
Correct Answer:
Verified

analyzers

A process in the _________ state is in main memory and available for execution.

Free
(Short Answer)
4.8/5
(42)
Correct Answer:
Verified

Ready

The process control block is the least important data structure in an OS.

(True/False)
4.8/5
(43)

When the OS creates a process at the explicit request of another process, the action is referred to as __________ .

(Short Answer)
5.0/5
(38)

All processor designs include a register or set of registers, often known as the program status word, which contains status information.

(True/False)
4.8/5
(31)

A total of _________ process states are recognized by the UNIX SVR4 operating system.

(Multiple Choice)
4.8/5
(34)

The process control block information can be grouped into three general categories: process identification, __________ and process control information.

(Short Answer)
4.9/5
(34)

When a process is in the _________ state it is in secondary memory but is available for execution as soon as it is loaded into main memory.

(Multiple Choice)
4.8/5
(43)

The portion of the operating system that selects the next process to run is called the _________ .

(Multiple Choice)
4.7/5
(36)

The OS must maintain __________ tables to manage processes.

(Multiple Choice)
4.8/5
(44)

A __________ is a legitimate user who accesses data, programs, or resources for which such access is not authorized, or who is authorized for such access but misuses his or her privileges.

(Short Answer)
4.9/5
(36)

The OS may suspend a process if it detects or suspects a problem.

(True/False)
4.9/5
(31)

If a system does not employ virtual memory each process to be executed must be fully loaded into main memory.

(True/False)
4.8/5
(39)

The first step in designing an OS to control processes is to describe the behavior that we would like the processes to exhibit.

(True/False)
4.9/5
(42)

The process control block is the key tool that enables the OS to support multiple processes and to provide for multiprocessing.

(True/False)
4.8/5
(33)

A design change in the structure or semantics of the process control block could affect a number of modules in the OS.

(True/False)
4.8/5
(39)

A _________ is an individual who is not authorized to use the computer and who penetrates a system's access controls to exploit a legitimate user's account.

(Short Answer)
4.8/5
(35)

The process is said to be operating in a _________ fashion if each process in the queue is given a certain amount of time, in turn, to execute and then returned to the queue, unless blocked.

(Short Answer)
4.9/5
(34)

A process that is not in main memory is immediately available for execution, regardless of whether or not it is awaiting an event.

(True/False)
4.9/5
(30)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)