Sample Test 2 Flashcards

1
Q

The processor itself provides only limited support for multiprogramming, and __________ is needed to manage the sharing of the processor and other resources by multiple applications at the same time.

A

software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

“The process was placed in a suspended state by an agent; either itself, a parent process, or the OS, for the purpose of preventing its execution,” is a characteristic of a _________ process.

A

suspended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A __________ is a unit of activity characterized by the execution of a sequence of instructions, a current state, and an associated set of system resources.

A

process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

We can characterize the behavior of an individual process by listing the sequence of instructions, referred to as a __________, that executes for that process.

A

trace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

It is the principal responsibility of the __________ to control the execution of processes.

A

OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When one process spawns another, the spawned process is referred to as the __________ .

A

child process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

__________ involves moving part or all of a process from main memory to disk.

A

swapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When a process is in the _________ state it is in secondary memory but is available for execution as soon as it is loaded into main memory.

A

Ready/Suspend

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A process is in the _________ state when it is in main memory and awaiting an event.

A

Blocked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The OS must maintain __________ tables to manage processes.

A

process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The collection of program, data, stack, and attributes is referred to as the _________ .

A

process image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The _________ is the less-privileged mode.

A

user mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A _________ is an individual who seizes supervisory control of the system and uses this control to evade auditing and access controls or to suppress audit collection.

A

clandestine user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A total of _________ process states are recognized by the UNIX SVR4 operating system.

A

9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The portion of the operating system that selects the next process to run is called the _________ .

A

dispatcher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The __________ is a layer of software between the applications and the computer hardware that supports applications and utilities.

A

Operating System (OS)

17
Q

A process is in the _________ state when it is in secondary memory and awaiting an event.

A

Blocked/Suspend

18
Q

Two essential elements of a process are __________ and a set of data associated with that code.

A

program code

19
Q

The _________ tables provide information about the existence of files, their location on secondary memory, their current status, and other attributes.

A

file

20
Q

A significant point about the __________ is that it contains sufficient information so that it is possible to interrupt a running process and later resume execution as if the interruption had not occurred.

A

process control block

21
Q

A __________ is a legitimate user who accesses data, programs, or resources for which such access is not authorized, or who is authorized for such access but misuses his or her privileges.

A

misfeasor

22
Q

When the OS creates a process at the explicit request of another process, the action is referred to as __________ .

A

process spawning

23
Q

The process is said to be operating in a _________ fashion if each process in the queue is given a certain amount of time, in turn, to execute and then returned to the queue, unless blocked.

A

round-robin

24
Q

A process in the _________ state is in main memory and available for execution.

A

Ready

25
Q

_________ tables are used to keep track of both main (real) and secondary (virtual) memory.

A

Memory

26
Q

The process control block information can be grouped into three general categories: process identification, __________ and process control information.

A

processor state information

27
Q

A __________ is the maximum amount of time that a process can execute before being interrupted.

A

time slice

28
Q

System access threats fall into two general categories: __________ and malicious software.

A

intruders

29
Q

A _________ is an individual who is not authorized to use the computer and who penetrates a system’s access controls to exploit a legitimate user’s account.

A

masquerader

30
Q

An IDS comprises three logical components: sensors, __________, and user interface.

A

analyzers