are usually spread by users downloading viral programs from public bulletin boards or exchanging floppy disks containing an infection
are beneficial for program
both (a) and (b)
none of these
the password is different in each instance
the password is same in each instance
another form of computer attack is virus
virus are designed to spread into other programs and can wreak havoc in a system
it modifying or destroying files and causing system crashes and program malfunctions
all of these
user passwords
user log in
hardware device
grappling hook program
main program
secondary program
primary storage
authentication problem
physical problem
human problem
are used only for capacity planning
are most useful for showing performance problems
are useless for capacity planning
cannot show the system paging rate
synchronize access to local resources
synchronize access to global resources
are used to avoid local locks
prevent access to global resources
is the same as device busy
shows the availability of the path of devices
can be prevented with more devices
can be prevented by reducing the paging rate
show which processes used the most processor time
show process activity by time interval
show resources used by the most active processes