Un-Answered Questions { Operating Systems }

describe my computer and my documents folders. identify the elements that are present in every window.

9811


i want placement papers of GAMELOFT software company and the information regarding windows operating system and MS-office questions

2774


in a direct memory access how does the CPU know when the memory operation are complete

2335


list TWO problems that force some operating system to use the technique of device dedication

1661


in a multiprogramming and time-sharing environment,several user share the system simultaneously. this situation can result in various security problems a.discuss two such problems b.how can we ensure the same degree of security in a time-share machine as in a dedicated machine?

18562


describe a typical multiple-level priority-base scheduling and give FIVE examples of factors that can be implemented on the different levels

1506


state and explain FIVE basic disk-based file system operation

1645


explain the need for a directory tree and how it is used

1514


describe the problem of race condition in an operating system and discuss TWO methods of addressing it

1901


what kind of operating(s)systems would be needed (and explain why) in an environment where there exist various cluster of networks which are all interconnected in different geographical areas with strong emphasis on online applicating process.

1641


Assuming feedback to the adversary flugging an error as each incorrect character is entered, what is the expected time to discover the correct password?

2859


Assuming one link of the Trojan horse copy-and-observe-later chain is broken. There are two other possible angles of attack by Alice: Alice logging on and attempting to read the string directly, and alice assigning a security level of sensitive to the back-pocket file. Does the reference monitor prevent these attacks?

2387


The flushing policy is described in the subsection on process migration strategies: a) From the perspective of the source, which other strategy does flushing resembles? b) From the perspective of the target, which other strategy does flushing resemble?

1811


Directories can be implemented either as "special files" that can only be accessed in limited ways, or as ordinary data files. What are the advantages and disadvantages of each approach?

4010


In the token-passing mutual exclusion algorithm, is the timestamping used to reset clocks and correct drifts, as in the distributed queue algorithms? if not, what is the function of the timestamping?

2275