CMSC 125: Operating Systems LE04

12345678910111213141516171819202122232425262728293031323334353637383940
Across
  1. 2. Results from disk head making contact with the disk surface.
  2. 4. Provides an object oriented way of implementing file systems.
  3. 7. Segment of code involving modification of common variables.
  4. 9. Program that initates a security incident under certain circumstances.
  5. 13. Allows bringing of page into memory only when needed.
  6. 15. Virtual memory uses disk space as extension of main memory.
  7. 20. More frames, more page fault.
  8. 21. Allows both parent and child process to initially share the same pages in memory.
  9. 22. The study of codes, or the art of writing and solving them.
  10. 24. Bypasses CPU to transfer data directly between I/O device and memory.
  11. 25. Same key used to encrypt and decrypt.
  12. 27. multiple disk drives providing reliability over redundancy.
  13. 29. Supports more than one task making progress
  14. 33. Pretending to be an authorized user to escalate privileges.
  15. 34. Holding/Queueing of output for a device if the device is capable of serving only one request at a time.
  16. 35. Find some page in memory, but not really in use, page it out.
  17. 36. Storage structure consisting of information about a file.
  18. 37. The art of hiding messages by converting them into hidden texts.
  19. 39. A destructive program that masquerades as a benign application.
Down
  1. 1. Is a storage made available over a network rather than over a local connection.
  2. 3. Time it takes to stop one process and start another.
  3. 5. Intercepting an already established session to bypass authentication.
  4. 6. Sepration of user logical memory from physical memory.
  5. 8. Identified performance gains from adding additional cores to an application with both serial and parallel components.
  6. 10. Hardware device which maps virtual addresses to corresponding physical addresses.
  7. 11. A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid
  8. 12. Sits between CPU registers and main memory.
  9. 14. Systems where access to main memory may vary.
  10. 16. Also called associative memory.
  11. 17. Amount of time from request to first response.
  12. 18. The time to move disk arm to the desired cylinder and tiem for desired sector to rotate under the disk head.
  13. 19. Uses the same page cache to cache both memory mapped pages and ordinary file system I/O to avoid double caching.
  14. 23. Phenomenon wherein no progress is achieved due to processes waiting on each other.
  15. 26. A software generated interrupt caused by an error or a user request.
  16. 28. Occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers
  17. 30. the art of decrypting or obtaining plain text from hidden messages over an insecure channel.
  18. 31. A network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules
  19. 32. Memory management scheme supporting user view of memory.
  20. 38. Occurs when a computer's virtual memory subsystem is in a constant state of paging.
  21. 40. A block of available memory.