CSE MCQ
another form of computer attack is virus
virus are designed to spread into other programs and can wreak havoc in a system
it modifying or destroying files and causing system crashes and program malfunctions
all of these
user passwords
user log in
hardware device
none of these
grappling hook program
main program
secondary program
primary storage
authentication problem
physical problem
human problem
are used only for capacity planning
are most useful for showing performance problems
are useless for capacity planning
cannot show the system paging rate
synchronize access to local resources
synchronize access to global resources
are used to avoid local locks
prevent access to global resources
is the same as device busy
shows the availability of the path of devices
can be prevented with more devices
can be prevented by reducing the paging rate
show which processes used the most processor time
show process activity by time interval
show resources used by the most active processes
is good, since that means the device is in use
is bad, since that means the device is not available
is bad only if the device busy rate is too high
depends upon the system paging rate
should show any immediate performance problems
should show I/O, paging, and processor activity
need show only the I/O and processor activity
usually reports only on terminal displays
is more secure than end-to-end encryption
is less secure than end-to-end encryption
cannot be used in a large network
is used only to detect errors
is used for analyzing paging problems
is used for analyzing device busy problems
is used for analyzing control-unit busy problems
is only shown on real-time displays
are legitimate programs that allow unauthorized access
are hacker programs that do not show up on the system
really do not usually work
usually are immediately discovered
before the CPU time slice expires
to allow starving processes to run
when it requests I/O
increases
decreases
remains constant
varies irregularly
Address of the data is generated by the CPU
Address of the data is supplied by the users.
There is no need for an address ie the data is used as an address
Data are accessed sequentially
9 bits
11 bits
13 bits
15 bits
2048
256
64
None of these
contiguous allocation of memory
linked allocation of memory
indexed allocation of memory