CPE151

12345678910111213141516171819
Across
  1. 1. It is a dedicated device that have been transformed into shared devices.
  2. 5. The subprocesses can run concurrently on different sites.
  3. 6. It is time to move disk arm to desired cylinder and time for desired sector to rotate under the disk head.
  4. 7. It is a network type that is point-to-point connections over long haul lines.
  5. 8. Several sites may want to transmit information over a link simultaneously.
  6. 11. It can be used to acquire IP addresses.
  7. 12. It a synchronized attempts to deny service to authorized users by causing a computer to perform repeated unproductive task.
  8. 14. It is an access control verification module that works well for systems with few files & few users.
  9. 16. It specifies how multiple users are to access a shared file simultaneously.
  10. 17. It uses preset policies to determine which process will get a device and for how long.
  11. 18. It is a group of related records that contains information used by specific application programs to generate reports.
  12. 19. intrusion It is any breach of security or modification of data that was not the results of a planned intrusion.
Down
  1. 2. It directory structure that have shared subdirectories and files.
  2. 3. It is similar to password but protects a single file.
  3. 4. A short name seen in directory listings and selected by user when files is created.
  4. 9. It is a full duplex communication channel between a user-level process and a data device in UNIX system V and beyond.
  5. 10. It is a collection of nodes containing information about all files.
  6. 11. It is used to avoid programmed I/O for large data movement.
  7. 13. It is a technique used to save space in files.
  8. 15. A site determines whether another message is currently being transmitted over that link.