Desktop virtualization allows separate partitions on a single server to run different
operating systems, so it is particularly useful for software developers. When
developing software to work across multiple platforms it can be very labor int
1. File deallocation is a process that is carried out by the computer that releases the
block of data from memory and allows that data to be used by another program. If
file deallocation does not occur regularly then the system would get a me
Describe at least one real world example showing benefit from lossy compression.
How does lossy compression help in this example? What would be the impact if
lossy compression were not used?
Lossy compression permanently reduces a files size
When would it be better to use relative file names over absolute file names, and viceversa?
A files absolute file name includes all path information (C:/startup/test.java).
While relative file name indicates the name without the path informa
Review the OSI and TCP/IP Models described on pages 312-319. Discuss the
differences between the two models. Use outside sources to support your response
(cite your sources where appropriate).
TCP/IP is very widely used discuss the complexit
Respond to Exercise 18 (18) on page 322. Additionally, for each environment
identify a poor network topology choice and justify your response.
a) Dorm Floor:
Bus topology would be the best topology for this network. Bus topology is
easy to i
Research Topic A:
1) Ubuntu 9.10
Vendor: Canonial Ltd. Open Source
Platform: X86 machines
Network: Supports LAN
2) Microsoft Windows XP
Vendor: Microsoft Corporation
Platform: X86 machines
Network: Supports LAN
3) Solaris 5.10
Vendor: SUN Mic
Review the section on Password Alternatives on pages 370-372. What issues might
arise from the use of graphical passwords?
When using graphical inputs, a few potential disadvantages are present.
Leading them is that graphical passwords are v
Research a DoS attack in a current online media source. Provide a link to the source
article(s). Describe the attack and its impact on the victim and/or its customers.
What changes could the victim of the attack make to prevent similar issue
CMU God Lesson analytic -15619 Cloud Computing
Computer science. Entrepreneur. Life. (/)
CMU God Lesson analytic -15619 Cloud
N O V E M B E R 2 1 S T, 2 0 1 4
Morning, the rst
Describe three types of physical storage currently used. What usage scenarios
would be ideal for each?
The three types of storage typically currently used are Magnetic Disk, Optical Disc,
and Solid State Storage.
Magnetic Disk drives are stor
On my home computer I would either user RAID level 0 or 3. Depending on whether
or not my data would be considered critical. Assuming the data is critical, I would
use level 3 because is effective in data critical systems that dont need to b
1. Seek time and search time are both related to magnetic disk drive access times.
Seek time is the slower of the two and is the time it takes to position the read/write
head on the proper track. Search time, or rotational delay, is the time
Assignment 2: Respond to Research Topic B (p. 52) and Exercises/Advanced
Exercises 2 (p. 53) and 5 (p. 96).
The first computers that can be considered portable where created in 1970s. The
IBM 5100 contained a screen, keyboard, and built-in nu
Describe the three specific deallocation scenarios that must be taken into
consideration. What would happen if these scenarios werent taken into
consideration in the operating systems memory deallocation algorithm?
The three deallocation scen
Is there a perfect memory page size? If so, what would it be and why? If not,
discuss why, including examples.
Page-file sizes are often based on a systems amount of physical RAM. It is a
common recommendation to set a page-file size at 1 the
I would expect the disk queue would have a faster response time than the
printer queue. When the job scheduler accepts a job a PCB (process control block) is
created and when the job is executed, the PCB is updated on the process state.
The first-come, first-served (FCFS) algorithm scheduling is just like it sounds.
It handles incoming objects based on when they arrive. Thus, the objects that arrive
sooner are served sooner. FCFS downside, however, is that it doesnt provide
When do preemptive scheduling policies excel? When do non-preemptive
scheduling policies excel? Provide an example of each not noted in the text.
A preemptive scheduling policy is a scheduling strategy in which there are
interrupt in the proc
Ex 1) A bank that offers loans would be a good example. In this situation there are
peoples who want to withdraw their money from their accounts and people who
want to borrow money from the bank. If the bank has lent more money t
A deadlock occurs in a database if two processes access and lock records of a
database. Database queries and transactions are often brief processes that search
or modify parts of a database. To guarantee integrity of data a technique called
What are the four conditions necessary for deadlock? Which one would be easiest
for the operating system for foresee? Would it be sufficient for the operating system
to focus on only one of the conditions to avoid deadlock?
The four condition
3. Name five current operating systems (other than those mentioned in Table 1.1) and
identify the devices that each is designed to run on.
OS X Yosemite servers and desktop Macs
Google chrome OS- Google Remote Desktop and Chr