Low CPU utilization
Starvation
Long turnaround time
Priority inversion
The page is found in memory
The page is not found in memory
There is an I/O operation
The process terminates
Best fit
Worst fit
First fit
All of the above
Mutual exclusion
Circular wait
Hold and wait
Programmed I/O
Interrupt-driven I/O
DMA (Direct Memory Access)
Synchronous I/O
A network encryption protocol
A program that appears harmless but contains malicious code
A method to speed up I/O operations
A security patch
Allow circular wait
Allow hold and wait
Request all resources at once
Enable mutual exclusion
Paging
Segmentation
Virtual Memory
None of the above
Keyboard
Mouse
CPU
Printer
LRU
Round-Robin
FIFO
SSTF
Arrange the following scheduling algorithms from lowest to highest priority in terms of process execution speed:
1️⃣ First-Come, First-Served (FCFS)
2️⃣ Round Robin
3️⃣ Shortest Job First (SJF)
4️⃣ Priority Scheduling
1 → 2 → 3 → 4
2 → 1 → 4 → 3
4 → 3 → 1 → 2
3 → 2 → 1 → 4
Deadlock prevention
Deadlock detection
Deadlock avoidance
Deadlock resolution
Encryption
Defragmentation
Multi-threading
Role-based access control
Public key encryption
Digital signatures
Process isolation
Seek time
Rotational latency
Transfer time
Disk access time
Backups
Firewalls
Hashing algorithms
Virtual memory
Speed up network traffic
Provide file management
Protect against unauthorized network access
Fragment large files
High CPU utilization
Low context switching
High context switching overhead
Monolithic
Microkernel
Hybrid kernel
Network kernel
FCFS
SCAN
C-SCAN
RAM
ROM
Hard Disk
Cache
Phishing
Man-in-the-middle
DDoS (Distributed Denial of Service)
Ransomware
Running
Ready
Terminated
Blocked
Prevention of unauthorized access
Controlled sharing of resources
Efficient CPU usage
Isolation between processes
Kernel
Shell
Memory Manager
Scheduler
exit()
fork()
kill()
wait()
Windows
Linux
RTOS
Android
Efficient CPU scheduling
Overlapping of input/output and CPU processing
Time-sharing in a multiprogramming system
CPU scheduling
Memory management
Resource allocation
Protection policies
Device Manager
File Manager
Contiguous allocation
Linked allocation
Indexed allocation
Deadlock
Buffer overflow
Disk fragmentation
Context switching
Users are given minimal resources
Programs should have minimal access necessary for functioning
Access rights should be least restrictive
No user is privileged in the system
All services inside the kernel
Minimal services in the kernel and most in user space
Only hardware communication
Extensive service drivers
Preloaded into memory
Loaded only when needed
Always available in the cache
Not used
P1, P2, P3, P1, P1, P1, P1, P1
P1, P2, P3, P1, P1, P1, P1
P1, P2, P3, P1, P1, P1
P2, P3, P1, P1, P1
Process management
Application software development
File management
The hardware interface layer
The user interface
The core part that manages system resources
A type of application software
An illusion of more memory than physically exists
The portion of physical memory that is virtualized
An extension of secondary storage
Used only in distributed systems
Sequential access
Direct access
Random access
Rotational access
Fragmentation
Swapping
Shortest Job First
Round Robin
First-Come, First-Served
Priority Scheduling