Show:
Questions
Responses
Print
not base 10
data manipulation
operating systems
security
mixed bag
100
10
What is the binary representation of 2?
100
c000
What is the halt command for the "toy" machine language studied?
100
linux, windows, mac osx
What are some names of common operating systems?
100
"password" or "1234"
What are examples of insecure/poorly chosen passwords?
100
FIFO
What is "first in, first out" scheduling algorithm?
200
F
What is the hex value for 15?
200
the three main components of a CPU
What are (1) arithmetic/logic unit, (2) general purpose registers/register unit, (3) control unit?
200
an illusion created by the operating system to make it appear as if memory is unlimited
What is "paging" (virtual memory)?
200
root
What is the common login account used by a systems administrator?
200
the fact that data and programs can both be stored in memory regardless of what function they serve
What is the "stored-program" concept?
300
the name of a chart showing inputs and outputs (often in binary form) for a circuit or set of statements
What is a logic (or truth) table?
300
Contains the next instruction to be executed in a program
What is the purpose/contents of the program counter (PC) register?
300
interrupt
What signals/occurs at the end of a time-slice?
300
knowing an error has occurred versus fixing an error that has occurred during transmission of data
What is the difference between error detection and error correction?
300
VLSI (very large-scale integration)
What is the name of the technique for "squishing" millions electrical components onto a chip?
400
generates a 1 (true) output only if exactly one of two inputs is true
What is the "XOR" function
400
the instruction for loading register 2 with the bit value 0001 0001
What does 2211 in the machine language encode?
400
program counter (PC), general purpose CPU registers, and affiliated memory cells
What are the three pieces of "process state" that the OS must track when switching between processes?
400
dictionary attack
What is name for when a hacker runs a script attempting all entries from a specific book to be used as a password for a system?
400
spooling
What is the OS approach of "saving up" data to be outputted at a future time?
500
10.101
What is the representation of two and five eighths in binary?
500
DSL
What is the abbreviation for "digital subscriber line?"
500
deadlock conditions (ie deadlock cannot occur unless all three are met)
What are (1) competition for nonshareable resources, (2) partial/incremental resource request process, (3) cannot forcibly retrieve resources?
500
number of bits in which two strings differ
What is "Hamming distance?"
500
the number of bits required to represent 32 different input combinations
What is 5?