Quiz 4 OS

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

QUESTION 1

1. Sequential record organization is by far the easiest to implement because records are stored and retrieved
serially, one after the other.

True

False

2 points
QUESTION 2
1. The IEEE and the Association for Computing Machinery (ACM) issued a standard of ethics for the global
computing community in 1977.

True

False

2 points
QUESTION 3
1. Many systems force users to have their files organized for fixed-length records if the records are to be
accessed directly.

True

False

2 points
QUESTION 4
1. ____ peruse data packets as they pass by, examine each one for specific information, and log copies of
interesting packets for more detailed examination.
a. Packet filters
b. Spoofers
c. Packet sniffers
d. Proxy servers

2 points
QUESTION 5
1. If the File Manager is required to provide detailed instructions for each system device (how to start it, get
it to move to the correct place where the desired record is located, and when to stop), then the program is
considered device dependent.

True

False

2 points
QUESTION 6
1. A file’s ____ filename includes all path information for that file.
a. extended
b. long-form
c. absolute
d. relative

2 points
QUESTION 7
1. A relative filename is a name that is selected by the File Manager when the file is created.

True

False

2 points
QUESTION 8
1. In indexed storage, when a file is created, the pointers in the index block are all set to ____.
a. null
b. the beginning of the volume
c. zero
d. the end of the volume

2 points
QUESTION 9
1. What strategy contributes most to system recovery?
a. encryption
b. authentication
c. integrity checking
d. data replication

2 points
QUESTION 10
1. A virus is defined as a small program written to alter the way a computer operates, without the permission
or knowledge of the user.

True

False

2 points
QUESTION 11
1. A master boot record virus infects both the boot record and program files, making them especially
difficult to repair.

True

False
2 points
QUESTION 12
1. ____ viruses infect data files.
a. File infector
b. Boot sector
c. Macro
d. Master boot record

2 points
QUESTION 13
1. Generally, ____ antivirus software compares file sizes (checking for added code when none is expected),
looks for replicating instructions, and searches for unusual file activity.
a. reactive
b. preventive
c. diagnostic
d. firewall

2 points
QUESTION 14
1. Within a file, variable-length records are easier to access directly than fixed-length records.

True

False

2 points
QUESTION 15
1. A field is a group of related records that can be identified by the user with a name, type, and size.

True

False

2 points
QUESTION 16
1. Intrusion detection is an example of a strategy for improving system survivability based on knowledge
gained from intrusions.

True

False

2 points
QUESTION 17
1. ____ storage allocation allows files to use any storage space available on the disk.
a. Extended
b. Fragmented
c. Contiguous
d. Noncontiguous

2 points
QUESTION 18
1. ____ text compression builds on the previous data element. The first data element in a list is not
compressed but each entry after that takes a given number of characters from the previous entry that they
have in common and then adds the characters that make it unique.
a. Repeated-terms
b. Front-end
c. Repeated-characters
d. Lossy

2 points
QUESTION 19
1. In noncontiguous storage, one way to link file extents is at the storage level where each extent points to
the ____.
a. next file in the sequence
b. next extent in the sequence
c. current subdirectory
d. master directory entry

2 points
QUESTION 20
1. One popular authentication tool is Kerberos, a network authentication protocol developed as part of the
Athena Project at MIT.

True

False

2 points
QUESTION 21
1. It will take a computer ____ to crack a password with a length of three characters if the computer tries
one million values per second.
a. .008788 seconds
b. 4.5 seconds
c. 2.5 hours
d. 58 hours

2 points
QUESTION 22
1. ____ is a form of social engineering whereby an intruder pretends to be a legitimate entity and contacts
unwary users asking them to reconfirm their personal and/or financial information.
a. Acting
b. Impersonating
c. Phishing
d. Spoofing

2 points
QUESTION 23
1. Directories are special files that contain listings of filenames and their attributes.

True

False

2 points
QUESTION 24
1. A subdirectory is created when a user opens an account to access the computer system.

True

False

2 points
QUESTION 25
1. ____ are special files with listings of filenames and their attributes.
a. Directories
b. Data files
c. Databases
d. Programs

2 points
QUESTION 26
1. What configuration has the highest level of risk?
a. LAN with Internet
b. LAN without Internet
c. LAN with firewall
d. Single computer without e-mail or Internet

2 points
QUESTION 27
1. The primary disadvantage of contiguous storage is that ____.
a. the file system cannot support direct access
b. a file can’t be expanded unless there is empty space available immediately following it
c. a file can be spread in small pieces throughout the storage area
d. the file system is difficult to create, implement, and manage

2 points
QUESTION 28
1. In a file directory tree structure, the “leaves” of the tree are subdirectories created by the user.

True

False

2 points
QUESTION 29
1. The formula for computing the current byte address (CBA) for a direct access file with fixed record
length is ____.
a. CBA = RN * RL
b. CBA = (RN – 1) * RL
c. CBA = (RN + 1) * RL
d. CBA = RN / RL

2 points
QUESTION 30
1. When nonsynchronized processes access data records and modify some but not all of a record’s fields, it
is called “accidental incomplete modification of data.”

True

False

You might also like