PA Incorrect Flashcards
Which generation of computers were large-scale integrated circuits used to develop personal computers for desktop and laptop operating systems?
4th gen
A company needs to determine when a computer experiences a microprocessor interrupt that is the result of a division by zero.
Which operating system (OS) service should be used?
Error detection
What does each thread of a multi-threaded process use to access shared code?
Program counter
A process is not attempting to enter the critical section (CS), but it is preventing other processes from entering the CS.
Which situation was caused by this process?
Lockout
Which step is completed first during an input/output (I/O) call?
The process is placed on the wait queue
What should be used to improve memory utilization when loading external references?
Dynamic Linking
Why are approximations used in place of the least-recently-used (LRU) algorithm?
Higher Efficiency
What describes the 50% rule in external memory fragmentation?
1/3rd of memory may be lost
What is used to determine the number of processes that can run concurrently?
Load Control
Which disk type provides direct access to a secondary storage device as an array of blocks with no file system?
Raw
What is the determining factor for sustained throughput in magnetic storage?
Data transfer rate
What can be used to access Dropbox?
API
What is partitioning?
Creating groups of blocks on secondary storage
What causes a page fault?
Present bit is set to 0
What are the two measures of positioning time?
Choose 2 answers.
Moving disk arm to desired cylinder, rotating disk to desired sector
A company needs to ensure consistent performance by decreasing the density of bits from inner tracks to outer tracks.
Which hard disk method should be used?
Constant angular velocity
Which file attribute should be used to identify who can access a file?
protection
When should digests be used?
Establishing an undeniable link between the document and its sender
Which cyberattack technique is mitigated by using the CTRL+ALT+DEL key sequence in the Windows operating systems?
Login spoofing
What is the physical memory size for an address size of 8 bits?
256
Which latency waits for the requested data to pass under the drive head of a magnetic hard disk?
Rotational Delay
What is a key that is used by a recipient to decrypt a message encrypted with asymmetric encryption?
Private
Which technique involves requesting an unsuspecting user to disclose their credit card information on a fake website that looks legitimate?
Phishing