What are typical access rights that may be granted or denied to a particular user for a particular file?
> What distinguishes client/server computing from any other form of distributed data processing?
> What is client/server computing?
> What conditions are generally associated with the readers/writers problem?
> A fraction P of the traffic from a single exponential server is fed back into the input as shown in Figure 21.11. In the figure, Λ denotes the system throughput, which is the output rate from the server. Figure 21.11: a. Determine the syste
> What is the difference between demand cleaning and precleaning?
> List and briefly define three file allocation methods.
> What is RIOT?
> What requirements should an IoT OS satisfy?
> List and briefly define the principal components of an IoT-enabled thing.
> Define the Internet of Things.
> What is the purpose of the Sockets interface?
> What is TCP/IP?
> What is a protocol architecture?
> What is a protocol?
> How are multiple interrupts dealt with?
> What tasks are performed by the transport layer?
> What is the major function of the network access layer?
> What is OpenStack?
> What is the relationship between a cloud OS and IaaS?
> List and briefly define the key components of a cloud operating system.
> What is the cloud computing reference architecture?
> List and briefly define three cloud service models.
> Define cloud computing.
> What is the default scheduling discipline for TinyOS?
> What software comprises the TinyOS operating system?
> A supplement to the X.25 packet-switching standard is a set of standards for a packet assembler-disassembler (PAD), defined in standards X.3, X.28, and X.29. A PAD is used to connect asynchronous terminals to a packet-switching network. Each terminal att
> List and briefly describe some of the defenses against buffer overflows that can be implemented when running existing, vulnerable programs
> List and briefly describe some of the defenses against buffer overflows that can be used when compiling new programs.
> What are the two broad categories of defenses against buffer overflows?
> What types of programming languages are vulnerable to buffer overflows?
> Briefly describe the difference between DAC and RBAC.
> In general terms, what are four means of authenticating a user’s identity?
> List and briefly define three classes of intruders.
> What are typical access rights that may be granted or denied to a particular user for a particular file?
> What is a TinyOS component?
> What are the design goals for TinyOS?
> What is an interrupt?
> What is the target application for Tiny OS?
> Explain the relative advantages and disadvantages of an embedded OS based on an existing commercial OS compared to a purpose-built embedded OS.
> Give a brief description of Java VM.
> Explain the concept of ballooning.
> Briefly describe container virtualization.
> Briefly describe Type 1 and Type 2 virtualization.
> What are some of the key characteristics of an embedded OS?
> What is an embedded OS?
> What are some typical requirements or constraints on embedded systems?
> What is an embedded system?
> What is the difference between a mode switch and a process switch?
> List and briefly define three blocking methods.
> What is the relationship between a pathname and a working directory?
> What are typical operations that may be performed on a directory?
> Why is the average search time to find a record in a file less for an indexed sequential file than for a sequential file?
> List and briefly define five file organizations.
> What criteria are important in choosing a file organization?
> What is a file management system?
> What is the difference between a file and a database?
> What is the difference between a field and a record?
> List and briefly define four different clustering methods.
> Briefly define feedback scheduling.
> Briefly define highest-response-ratio-next scheduling.
> Briefly define shortest-remaining-time scheduling.
> What is the typical disk sector size?
> Briefly define the seven RAID levels.
> Briefly define the disk scheduling policies illustrated in Figure 11.7. Figure 11.7: 100 125 150 175 199 Time (a) FIFO 25 50 100 125 150 175 199 Time (h) SSTF 50 75 100 125 150 175 199 Time (c) SCAN 50 100 125 150 175 199 Time (d) C-SCAN Figure 11.7
> What delay elements are involved in a disk read or write?
> Why would you expect improved performance using a double buffer rather than a single buffer for I/O?
> What is the difference between block-oriented devices and stream-oriented devices? Give a few examples of each.
> What is the difference between logical I/O and device I/O?
> List some benefits and disadvantages of synchronous and asynchronous RPCs.
> List and briefly define three techniques for performing I/O.
> What items of information about a task might be useful in real-time scheduling?
> List and briefly define four classes of real-time scheduling algorithms.
> List and briefly define five general areas of requirements for a real-time operating system.
> What is the difference between periodic and aperiodic real-time tasks?
> What is the difference between hard and soft real-time tasks?
> List and briefly define three versions of load sharing.
> List and briefly define four techniques for thread scheduling.
> List and briefly define five different categories of synchronization granularity.
> Briefly define shortest-process-next scheduling.
> List some benefits and disadvantages of nonpersistent and persistent binding for RPCs.
> Briefly define round-robin scheduling.
> Briefly define FCFS scheduling.
> What is the difference between preemptive and nonpreemptive scheduling?
> For process scheduling, does a low-priority value represent a low priority or a high priority?
> What is the difference between turnaround time and response time?
> What is usually the critical performance requirement in an operating system?
> Briefly describe the three types of processor scheduling.
> What is the difference between a resident set and a working set?
> Why is it not possible to combine a global replacement policy and a fixed allocation policy?
> What is accomplished by page buffering?
> List some benefits and disadvantages of blocking and non-blocking primitives for message passing.
> Discuss some of the reasons for implementing process migration.
> Jose and Gabriela Perez, of Bridgewater, Virginia, hope to sell their large home for $380,000 and retire to a smaller residence valued at $150,000. After hey sell the property, they plan to invest the $200,000 in equity remaining after selling expenses a
> Insurance Victor and Maria’s next-door neighbor, Ray Jackson, was recently sued over an automobile accident and eventually was held liable for $437,000 in damages. Ray’s automobile policy limits were 100/300/50. Because of the shortfall, he had to sell h
> Jackie Facet of Auburn, Alabama, age 60, was planning on retirement and investing well for it because he now has $400,000 in his retirement accounts and would likely to have doubled that by age 67. But, he became permanently disabled after getting into a
> Shanice Johnson, of Philadelphia, Pennsylvania, wants to invest $4,000 annually for her retirement 30 years from now. She has a conservative investment philosophy and expects to earn a return of 3 percent in a tax-sheltered account. If she took a more ag
> Janet Brooks, of Amarillo, Texas, plans to invest $3,000 each year in a mutual fund for the next 40 years to accumulate savings for retirement. Her twin sister, Rebecca, plans to invest the same amount for the same length of time in the same mutual fund.
> Brenda and Dan Domico, of Weatherford, Texas, desire an annual retirement income of $40,000. They expect to live for 30 years past retirement. Assuming that the couple could earn a 3 percent after-tax and after-inflation rate of return on their investmen
> Over the years, Ahmed and Aamina El-zayaty, of Berkeley, California, have accumulated $200,000 and $220,000, respectively, in their employer-sponsored retirement plans. If the amounts in their two accounts earn a 6 percent rate of return over Ahmed and A
> Ashley Travis, of Harrisburg, Illinois, is in the 25 percent marginal tax bracket and is considering the tax consequences of investing $2,000 at the end of each year for 30 years in a tax-sheltered retirement account, assuming that the investment earns 8