CMSC 125: Operating Systems LE04

1234567891011121314151617181920212223242526272829303132333435363738
Across
  1. 2. multiple disk drives providing reliability over redundancy.
  2. 3. Provides an object oriented way of implementing file systems.
  3. 10. Intercepting an already established session to bypass authentication.
  4. 13. Allows bringing of page into memory only when needed.
  5. 15. Bypasses CPU to transfer data directly between I/O device and memory.
  6. 17. Supports more than one task making progress
  7. 21. Identified performance gains from adding additional cores to an application with both serial and parallel components.
  8. 23. the art of decrypting or obtaining plain text from hidden messages over an insecure channel.
  9. 24. A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid
  10. 25. Is a storage made available over a network rather than over a local connection.
  11. 26. Segment of code involving modification of common variables.
  12. 28. Amount of time from request to first response.
  13. 29. Allows both parent and child process to initially share the same pages in memory.
  14. 30. Occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers
  15. 34. The art of hiding messages by converting them into hidden texts.
  16. 35. Sepration of user logical memory from physical memory.
  17. 36. Also called associative memory.
  18. 37. A network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules
  19. 38. A block of available memory.
Down
  1. 1. A destructive program that masquerades as a benign application.
  2. 4. Memory management scheme supporting user view of memory.
  3. 5. Holding/Queueing of output for a device if the device is capable of serving only one request at a time.
  4. 6. More frames, more page fault.
  5. 7. Phenomenon wherein no progress is achieved due to processes waiting on each other.
  6. 8. Uses the same page cache to cache both memory mapped pages and ordinary file system I/O to avoid double caching.
  7. 9. The time to move disk arm to the desired cylinder and tiem for desired sector to rotate under the disk head.
  8. 11. Systems where access to main memory may vary.
  9. 12. Find some page in memory, but not really in use, page it out.
  10. 14. Program that initates a security incident under certain circumstances.
  11. 16. A software generated interrupt caused by an error or a user request.
  12. 18. Results from disk head making contact with the disk surface.
  13. 19. Time it takes to stop one process and start another.
  14. 20. Virtual memory uses disk space as extension of main memory.
  15. 22. Pretending to be an authorized user to escalate privileges.
  16. 27. Occurs when a computer's virtual memory subsystem is in a constant state of paging.
  17. 29. The study of codes, or the art of writing and solving them.
  18. 31. Hardware device which maps virtual addresses to corresponding physical addresses.
  19. 32. Same key used to encrypt and decrypt.
  20. 33. Sits between CPU registers and main memory.
  21. 37. Storage structure consisting of information about a file.