For each question, answer whether it is true or false. If false, explain why in detail. 1. The NUR (not used recently) s

Business, Finance, Economics, Accounting, Operations Management, Computer Science, Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Algebra, Precalculus, Statistics and Probabilty, Advanced Math, Physics, Chemistry, Biology, Nursing, Psychology, Certifications, Tests, Prep, and more.
Post Reply
answerhappygod
Site Admin
Posts: 899603
Joined: Mon Aug 02, 2021 8:13 am

For each question, answer whether it is true or false. If false, explain why in detail. 1. The NUR (not used recently) s

Post by answerhappygod »

For each question, answer whether it is true or false. If false,explain why in detail.1. The NUR (not used recently) scheme uses the dirty bit andtheaccess bit to set the next page to be reset. Priority is given topageswith the access bit and the dirty bit set to zero, followed bythose with only the referendum(access) bit reset.2. The NUR scheme has great performance, unfortunately it needs theaccess bits anddirty bit to run. Without these, it's impossible.3. The "FIFO second chance" scheme is a variation of FIFO that usesthe "referencebit” and the locality principle to improve FIFO policy.4. The “working set” strategy determines a “window” of access. Theworking setconsists of the pages accessed in this window.5. ARM processors work with different page sizes coexisting inthesame system.6. Intel processors work with a choice of page sizes, butonly one size is used at a time.7. The inverted page table table schema if implemented withoutanyoptimization is unfeasible, as it would entail a linear overhead inmemory size.8. Files can be organized into records or bytes. Unix filesareorganized in bytes.9. Directories are always, on all systems, special files thatcontaininformation about each file such as access permissions.10. Server systems often contain special files, with recordsformats and mechanisms for efficient access. An example is the ISAM(indexsequential access method), which can be used both forefficient accesssequential, as for efficient access by index.31. In Unix we havethree types of files: character, binary and archive. They areidentified by the system using the “magic number”.11. In read operations, the user must provide a writing area. ifthat's notdone, it is difficult to predict the space overhead needed by thefile systemswork.12. Hard links can be more secure than soft links.13. Soft links can be more secure than hard links.14. Files on hard drives are always allocated in blocks that canbedistributed anywhere on the disk.15. The FAT file system uses “write through” cache where anymodificationin the cache is immediately written to disk. The locality principleensures thatthis does not generate significant overhead.16. Unix stems perform periodic cache synchronization operations,so ifa program dies unexpectedly some data may not have beenwritten.17. Modern systems are increasingly secure, modern securitytechniquesguarantee the infeasibility of critical systems, even whenconnected to the internet.Unfortunately, the high cost of these mechanisms makes mostlargecorporations do not use it, which generates the security flawsreportedregularly.18. One of the principles of designing security systems is that thescheme must bepublic, should not depend on the secrecy of its workingmechanism.19. Some systems create hackable logins to try to locate malicioususeof the system.
Join a community of subject matter experts. Register for FREE to view solutions, replies, and use search function. Request answer by replying!
Post Reply