Across
- 2. Results from disk head making contact with the disk surface.
- 4. Provides an object oriented way of implementing file systems.
- 7. Segment of code involving modification of common variables.
- 9. Program that initates a security incident under certain circumstances.
- 13. Allows bringing of page into memory only when needed.
- 15. Virtual memory uses disk space as extension of main memory.
- 20. More frames, more page fault.
- 21. Allows both parent and child process to initially share the same pages in memory.
- 22. The study of codes, or the art of writing and solving them.
- 24. Bypasses CPU to transfer data directly between I/O device and memory.
- 25. Same key used to encrypt and decrypt.
- 27. multiple disk drives providing reliability over redundancy.
- 29. Supports more than one task making progress
- 33. Pretending to be an authorized user to escalate privileges.
- 34. Holding/Queueing of output for a device if the device is capable of serving only one request at a time.
- 35. Find some page in memory, but not really in use, page it out.
- 36. Storage structure consisting of information about a file.
- 37. The art of hiding messages by converting them into hidden texts.
- 39. A destructive program that masquerades as a benign application.
Down
- 1. Is a storage made available over a network rather than over a local connection.
- 3. Time it takes to stop one process and start another.
- 5. Intercepting an already established session to bypass authentication.
- 6. Sepration of user logical memory from physical memory.
- 8. Identified performance gains from adding additional cores to an application with both serial and parallel components.
- 10. Hardware device which maps virtual addresses to corresponding physical addresses.
- 11. A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid
- 12. Sits between CPU registers and main memory.
- 14. Systems where access to main memory may vary.
- 16. Also called associative memory.
- 17. Amount of time from request to first response.
- 18. The time to move disk arm to the desired cylinder and tiem for desired sector to rotate under the disk head.
- 19. Uses the same page cache to cache both memory mapped pages and ordinary file system I/O to avoid double caching.
- 23. Phenomenon wherein no progress is achieved due to processes waiting on each other.
- 26. A software generated interrupt caused by an error or a user request.
- 28. Occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers
- 30. the art of decrypting or obtaining plain text from hidden messages over an insecure channel.
- 31. A network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules
- 32. Memory management scheme supporting user view of memory.
- 38. Occurs when a computer's virtual memory subsystem is in a constant state of paging.
- 40. A block of available memory.
