MID-II Examinations April 2018 Course: B. Tech Branch:CSE Year: II. Date of Exam: AN Max.Marks 30 TIME :02:00PM TO 03:00 PM
|
|
- Madlyn Pope
- 5 years ago
- Views:
Transcription
1 MID-II Examinatins April 2018 Curse: B. Tech Branch:CSE Year: II Subject: OS Semester :II Date f Exam: AN Max.Marks 30 TIME :02:00PM TO 03:00 PM Answer ANY TWO f the fllwing 2 x 15 = 30 Marks 1.A) Define Pure Demand Paging?[2M] SCHEME OF EVALUATION Crrect Definitin Marks NO pages are swapped in fr a prcess until they are requested by page faults. This is knwn as pure demand paging. 1.B) Describe Virtual Address Space?[3marks] Crrect Descriptin Marks Virtual address space is the prgrammer s lgical view f prcess memry strage. The prcess s page table cntrls the actual physical layut. 1 C) State and Explain Belady s anmaly with example? [5 marks] Crrect Explanatin Marks Example Marks An interesting effect that can ccur with FIFO is Belady's anmaly, in which increasing the number f frames available can actually increase the number f page faults that ccur! Cnsider, fr example, the fllwing chart based n the page sequence ( 1, 2, 3, 4, 1, 2, 5, 1, 2, 3, 4, 5 ) and a varying number f available frames. Obviusly the maximum number f faults is 12 ( every request generates a fault ), and the minimum number is 5 ( each page laded nly nce ), but in between there are sme interesting results:
2 Frame Pagefaults D) Assume that there are 3 page frames which are initially empty. If the page reference string is 1, 2, 3,4, 2, 1, 5, 3, 2, 4, 6. Calculate the number f page faults using the ptimal replacement plicy and Least Recently Used Plicy.? [5 marks] Crrect Prcess Marks Crrect Page faults Marks OPTIMAL Page Replacement N. f Page Faults: 7 Least Recently Used N. f Page Faults: 10
3 2 A) Define Bt disk? [2 marks] Crrect Definitin Marks A bt disk is a disk that a cmputer can start up r "bt" frm. The mst cmmn type f bt disk is an internal hard drive, which mst cmputers use t start up frm. 2 B) What are the typical peratins that can be perfrmed n directry? [3 marks] Identifying crrect Operatin Marks Search fr a file Create a file - add t the directry Delete a file - erase frm the directry List a directry - pssibly rdered in different ways. Rename a file - may change srting rder Traverse the file system. 2 C) Explain the cncept f file sharing? What are the criteria t be fllwed in systems which implement file sharing? [10 marks] Identifying crrect Implementatins Marks Multiple Users On a multi-user system, mre infrmatin needs t be stred fr each file: The wner ( user ) wh wns the file, and wh can cntrl its access. The grup f ther user IDs that may have sme special access t the file. What access rights are affrded t the wner ( User ), the Grup, and t the rest f the wrld ( the universe, a.k.a. Others. ) Sme systems have mre cmplicated access cntrl, allwing r denying specific accesses t specifically named users r grups. File Systems The advent f the Internet intrduces issues fr accessing files stred n remte cmputers The riginal methd was ftp, allwing individual files t be transprted acrss systems as needed. Ftp can be either accunt and passwrd cntrlled, r annymus, nt requiring any user name r passwrd. Varius frms f distributed file systems allw remte file systems t be munted nt a lcal directry structure, and accessed using nrmal file access cmmands. ( The actual files are still transprted acrss the netwrk as needed, pssibly using ftp as the underlying transprt mechanism. ) The WWW has made it easy nce again t access files n remte systems withut munting their filesystems, generally using ( annymus ) ftp as the underlying file transprt mechanism. The Client-Server Mdel When ne cmputer system remtely munts a filesystem that is physically lcated n anther system, the system which physically wns the files acts as a server, and the system which munts them is the client. User IDs and grup IDs must be cnsistent acrss bth systems fr the system t wrk prperly. ( I.e. this is mst applicable acrss multiple cmputers managed by the same rganizatin, shared by a cmmn grup f users. ) The same cmputer can be bth a client and a server. ( E.g. crss-linked file systems. ) There are a number f security cncerns invlved in this mdel: Servers cmmnly restrict munt permissin t certain trusted systems nly. Spfing ( a cmputer pretending t be a different cmputer ) is a ptential security risk. Servers may restrict remte access t read-nly.
4 Servers restrict which filesystems may be remtely munted. Generally the infrmatin within thse subsystems is limited, relatively public, and prtected by frequent backups. The NFS ( Netwrk File System ) is a classic example f such a system. Distributed Infrmatin Systems The Dmain Name System, DNS, prvides fr a unique naming system acrss all f the Internet. Dmain names are maintained by the Netwrk Infrmatin System, NIS, which unfrtunately has several security issues. NIS+ is a mre secure versin, but has nt yet gained the same widespread acceptance as NIS. Micrsft's Cmmn Internet File System, CIFS, establishes a netwrk lgin fr each user n a netwrked system with shared file access. Older Windws systems used dmains, and newer systems ( XP, 2000 ), use active directries. User names must match acrss the netwrk fr this system t be valid. A newer apprach is the Lightweight Directry-Access Prtcl, LDAP, which prvides a secure single sign-n fr all users t access all resurces n a netwrk. This is a secure system which is gaining in ppularity, and which has the maintenance advantage f cmbining authrizatin infrmatin in ne central lcatin. Failure Mdes When a lcal disk file is unavailable, the result is generally knwn immediately, and is generally nn-recverable. The nly reasnable respnse is fr the respnse t fail. Hwever when a remte file is unavailable, there are many pssible reasns, and whether r nt it is unrecverable is nt readily apparent. Hence mst remte access systems allw fr blcking r delayed respnse, in the hpes that the remte system ( r the netwrk ) will cme back up eventually. Cnsistency Semantics Cnsistency Semantics deals with the cnsistency between the views f shared files n a netwrked system. When ne user changes the file, when d ther users see the changes? 3 A) Describe the representatin f a resurce allcatin graph. [2 Marks] Descriptin Marks In sme cases deadlcks can be understd mre clearly thrugh the use f Resurce- Allcatin Graphs, having the fllwing prperties: A set f resurce categries, { R1, R2, R3,..., RN }, which appear as square ndes n the graph. Dts inside the resurce ndes indicate specific instances f the resurce. ( E.g. tw dts might represent tw laser printers. ) A set f prcesses, { P1, P2, P3,..., PN } Request Edges - A set f directed arcs frm Pi t Rj, indicating that prcess Pi has requested Rj, and is currently waiting fr that resurce t becme available. Assignment Edges - A set f directed arcs frm Rj t Pi indicating that resurce Rj has been allcated t prcess Pi, and that Pi is currently hlding resurce Rj.
5 3 B) List Gal f Prtectin. [3 marks] Each crrect Gal Mark 1x3=3 Marks Obviusly t prevent malicius misuse f the system by users r prgrams. T ensure that each shared resurce is used nly in accrdance with system plicies, which may be set either by system designers r by system administratrs. T ensure that errant prgrams cause the minimal amunt f damage pssible. Nte that prtectin systems nly prvide the mechanisms fr enfrcing plicies and ensuring reliable systems. It is up t administratrs and users t implement thse mechanisms effectively. 3 C) Explain Hw d system Recver frm Deadlck? [5 Marks] Identifying crrect appraches Marks Explanatin Marks There are three basic appraches t recvery frm deadlck: Prcess Terminatin 1. Infrm the system peratr, and allw him/her t take manual interventin. 2. Terminate ne r mre prcesses invlved in the deadlck 3. Preempt resurces. Tw basic appraches, bth f which recver resurces allcated t terminated prcesses: Terminate all prcesses invlved in the deadlck. This definitely slves the deadlck, but at the expense f terminating mre prcesses than wuld be abslutely necessary. Terminate prcesses ne by ne until the deadlck is brken. This is mre cnservative, but requires ding deadlck detectin after each step. Resurce Preemptin When preempting resurces t relieve deadlck, there are three imprtant issues t be addressed: 1. Selecting a victim - Deciding which resurces t preempt frm which prcesses invlves many f the same decisin criteria utlined abve.
6 2. Rllback - Ideally ne wuld like t rll back a preempted prcess t a safe state prir t the pint at which that resurce was riginally allcated t the prcess. Unfrtunately it can be difficult r impssible t determine what such a safe state is, and s the nly safe rllback is t rll back all the way back t the beginning. ( I.e. abrt the prcess and make it start ver. ) 3. Starvatin - Hw d yu guarantee that a prcess wn't starve because its resurces are cnstantly being preempted? One ptin wuld be t use a pririty system, and increase the pririty f a prcess every time its resurces get preempted. Eventually it shuld get a high enugh pririty that it wn't get preempted any mre. 3 D) Explain Varius Methds fr handling Deadlcks? [5 marks] Identifying crrect Methds Marks Explanatin Marks Generally speaking there are three ways f handling deadlcks: 1. Deadlck preventin r avidance - D nt allw the system t get int a deadlcked state. 2. Deadlck detectin and recvery - Abrt a prcess r preempt sme resurces when deadlcks are detected. 3. Ignre the prblem all tgether - If deadlcks nly ccur nce a year r s, it may be better t simply let them happen and rebt as necessary than t incur the cnstant verhead and system perfrmance penalties assciated with deadlck preventin r detectin. This is the apprach that bth Windws and UNIX take. 4A) Define Prtectin Dmain? [2 Marks] Definitin Marks A prtectin dmain specifies the resurces that a prcess may access.each dmain defines a set f bjects and the types f peratins that may be invked n each bject. 4 B) Describe the cnditin under which a deadlck situatin may arise?[ 3Marks] Crrect Cnditins Marks 1. Mutual Exclusin - At least ne resurce must be held in a nn-sharable mde; If any ther prcess requests this resurce, then that prcess must wait fr the resurce t be released. 2. Hld and Wait - A prcess must be simultaneusly hlding at least ne resurce and waiting fr at least ne resurce that is currently being held by sme ther prcess. 3. N preemptin - Once a prcess is hlding a resurce ( i.e. nce its request has been granted ), then that resurce cannt be taken away frm that prcess until the prcess vluntarily releases it. 4. Circular Wait - A set f prcesses { P0, P1, P2,..., PN } must exist such that every P[ i ] is waiting fr P[ ( i + 1 ) % ( N + 1 ) ].
7 4C) Write abut Swap Space Management. [5 marks] Explanatin Marks Example Marks Mdern systems typically swap ut pages as needed, rather than swapping ut entire prcesses. Hence the swapping system is part f the virtual memry management system. Managing swap space is bviusly an imprtant task fr mdern OSes. Swap-Space Use The amunt f swap space needed by an OS varies greatly accrding t hw it is used. Sme systems require an amunt equal t physical RAM; sme want a multiple f that; sme want an amunt equal t the amunt by which virtual memry exceeds physical RAM, and sme systems use little r nne at all! Sme systems supprt multiple swap spaces n separate disks in rder t speed up the virtual memry system. Swap-Space Lcatin Swap space can be physically lcated in ne f tw lcatins: As a large file which is part f the regular filesystem. This is easy t implement, but inefficient. Nt nly must the swap space be accessed thrugh the directry system, the file is als subject t fragmentatin issues. Caching the blck lcatin helps in finding the physical blcks, but that is nt a cmplete fix. As a raw partitin, pssibly n a separate r little-used disk. This allws the OS mre cntrl ver swap space management, which is usually faster and mre efficient. Fragmentatin f swap space is generally nt a big issue, as the space is re-initialized every time the system is rebted. The dwnside f keeping swap space n a raw partitin is that it can nly be grwn by repartitining the hard drive. Swap-Space Management: An Example Histrically OSes swapped ut entire prcesses as needed. Mdern systems swap ut nly individual pages, and nly as needed. ( Fr example prcess cde blcks and ther blcks that have nt been changed since they were riginally laded are nrmally just freed frm the virtual memry system rather than cpying them t swap space, because it is faster t g find them again in the filesystem and read them back in frm there than t write them ut t swap space and then read them back. ) In the mapping system shwn belw fr Linux systems, a map f swap space is kept in memry, where each entry crrespnds t a 4K blck in the swap space. Zers indicate free slts and nn-zers refer t hw many prcesses have a mapping t that particular blck ( >1 fr shared pages nly. ) The data structures fr swapping n Linux systems.
8 4D) Suppse that a disk drive has 5,000 cylinders, numbered 0 t The drive is currently serving a request at cylinder 143, and the previus request was at cylinder 125. The queue f pending requests, in FIFO rder, is: 86, 1470, 913, 1774, 948, 1509,1022, 1750, 130. Starting frm the current head psitin, what is the ttal distance (in cylinders) that the disk arm mves t satisfy all the pending requests fr each f the SSTF disk scheduling algrithms? [5 marks] Crrect Head Mvement Marks Calculatin Mark The SSTF schedule is 143, 130, 86, 913, 948, 1022, 1470, 1509, 1750, The ttal seek distance is 1745.
CSE 3320 Operating Systems Deadlock Jia Rao
CSE 3320 Operating Systems Deadlck Jia Ra Department f Cmputer Science and Engineering http://ranger.uta.edu/~jra Recap f the Last Class Race cnditins Mutual exclusin and critical regins Tw simple appraches
More informationINSTALLING CCRQINVOICE
INSTALLING CCRQINVOICE Thank yu fr selecting CCRQInvice. This dcument prvides a quick review f hw t install CCRQInvice. Detailed instructins can be fund in the prgram manual. While this may seem like a
More informationOperating systems. Module 15 kernel I/O subsystem. Tami Sorgente 1
Operating systems Mdule 15 kernel I/O subsystem Tami Srgente 1 SWAP SPACE MANAGEMENT Swap space can be defined as a temprary strage lcatin that is used when system s memry requirements exceed the size
More informationSummary. Server environment: Subversion 1.4.6
Surce Management Tl Server Envirnment Operatin Summary In the e- gvernment standard framewrk, Subversin, an pen surce, is used as the surce management tl fr develpment envirnment. Subversin (SVN, versin
More informationThese tasks can now be performed by a special program called FTP clients.
FTP Cmmander FAQ: Intrductin FTP (File Transfer Prtcl) was first used in Unix systems a lng time ag t cpy and mve shared files. With the develpment f the Internet, FTP became widely used t uplad and dwnlad
More informationCCNA Security v2.0 Chapter 3 Exam Answers
CCNA Security v2.0 Chapter 3 Exam Answers 1. Because f implemented security cntrls, a user can nly access a server with FTP. Which AAA cmpnent accmplishes this? accunting accessibility auditing authrizatin
More informationPlease contact technical support if you have questions about the directory that your organization uses for user management.
Overview ACTIVE DATA CALENDAR LDAP/AD IMPLEMENTATION GUIDE Active Data Calendar allws fr the use f single authenticatin fr users lgging int the administrative area f the applicatin thrugh LDAP/AD. LDAP
More informationCS510 Concurrent Systems Class 2. A Lock-Free Multiprocessor OS Kernel
CS510 Cncurrent Systems Class 2 A Lck-Free Multiprcessr OS Kernel The Synthesis kernel A research prject at Clumbia University Synthesis V.0 ( 68020 Uniprcessr (Mtrla N virtual memry 1991 - Synthesis V.1
More informationContents: Module. Objectives. Lesson 1: Lesson 2: appropriately. As benefit of good. with almost any planning. it places on the.
1 f 22 26/09/2016 15:58 Mdule Cnsideratins Cntents: Lessn 1: Lessn 2: Mdule Befre yu start with almst any planning. apprpriately. As benefit f gd T appreciate architecture. it places n the understanding
More informationVMware AirWatch Certificate Authentication for Cisco IPSec VPN
VMware AirWatch Certificate Authenticatin fr Cisc IPSec VPN Fr VMware AirWatch Have dcumentatin feedback? Submit a Dcumentatin Feedback supprt ticket using the Supprt Wizard n supprt.air-watch.cm. This
More informationIT Essentials (ITE v6.0) Chapter 5 Exam Answers 100% 2016
IT Essentials (ITE v6.0) Chapter 5 Exam Answers 100% 2016 1. What are tw functins f an perating system? (Chse tw.) cntrlling hardware access managing applicatins text prcessing flw chart editing prgram
More informationDNS (Domain Name Service)
mywbut.cm DNS (Dmain Name Service) The internet primarily uses IP addresses fr lcating ndes. Hwever, its humanly nt pssible fr us t keep track f the many imprtant ndes as numbers. Alphabetical names as
More informationAdmin Report Kit for Exchange Server
Admin Reprt Kit fr Exchange Server Reprting tl fr Micrsft Exchange Server Prduct Overview Admin Reprt Kit fr Exchange Server (ARKES) is an Exchange Server Management and Reprting slutin that addresses
More informationFREE UP SPACE ON YOUR C: DRIVE IN "WINDOWS.."
FREE UP SPACE ON YOUR C: DRIVE IN "WINDOWS.." Web lcatin fr this presentatin: http://aztcs.rg Click n Meeting Ntes 2 SUMMARY The manufacturers f cmputers have been replacing the internal hard drives with
More informationLog shipping is a HA option. Log shipping ensures that log backups from Primary are
LOG SHIPPING Lg shipping is a HA ptin. Lg shipping ensures that lg backups frm Primary are cntinuusly applied n standby. Lg shipping fllws a warm standby methd because manual prcess is invlved t ensure
More informationTroubleshooting of network problems is find and solve with the help of hardware and software is called troubleshooting tools.
Q.1 What is Trubleshting Tls? List their types? Trubleshting f netwrk prblems is find and slve with the help f hardware and sftware is called trubleshting tls. Trubleshting Tls - Hardware Tls They are
More informationSoftware Usage Policy Template
Sftware Usage Plicy Template This template is t accmpany the article: The Sftware Usage Plicy - An Indispensible Part f Yu SAM Tlbx The full article can be fund here: http://www.itassetmanagement.net/tag/plicy-template/
More informationRISKMAN REFERENCE GUIDE TO USER MANAGEMENT (Non-Network Logins)
Intrductin This reference guide is aimed at managers wh will be respnsible fr managing users within RiskMan where RiskMan is nt cnfigured t use netwrk lgins. This guide is used in cnjunctin with the respective
More informationCS4500/5500 Operating Systems Computer and Operating Systems Overview
Operating Systems Cmputer and Operating Systems Overview Yanyan Zhuang Department f Cmputer Science http://www.cs.uccs.edu/~yzhuang UC. Clrad Springs Ref. MOS4E, OS@Austin, Clumbia, UWisc Overview Recap
More informationClassFlow Administrator User Guide
ClassFlw Administratr User Guide ClassFlw User Engagement Team April 2017 www.classflw.cm 1 Cntents Overview... 3 User Management... 3 Manual Entry via the User Management Page... 4 Creating Individual
More informationNetwork Rail ARMS - Asbestos Risk Management System. Training Guide for use of the Import Survey Template
Netwrk Rail ARMS - Asbests Risk Management System Training Guide fr use f the Imprt Survey Template The ARMS Imprt Survey Template New Asbests Management Surveys and their Survey Detail reprts can be added
More informationCustodial Integrator. Release Notes. Version 3.11 (TLM)
Custdial Integratr Release Ntes Versin 3.11 (TLM) 2018 Mrningstar. All Rights Reserved. Custdial Integratr Prduct Versin: V3.11.001 Dcument Versin: 020 Dcument Issue Date: December 14, 2018 Technical Supprt:
More informationEastern Mediterranean University School of Computing and Technology Information Technology Lecture2 Functions
Eastern Mediterranean University Schl f Cmputing and Technlgy Infrmatin Technlgy Lecture2 Functins User Defined Functins Why d we need functins? T make yur prgram readable and rganized T reduce repeated
More informationCSE 3320 Operating Systems Computer and Operating Systems Overview Jia Rao
CSE 3320 Operating Systems Cmputer and Operating Systems Overview Jia Ra Department f Cmputer Science and Engineering http://ranger.uta.edu/~jra Overview Recap f last class What is an perating system?
More information- Replacement of a single statement with a sequence of statements(promotes regularity)
ALGOL - Java and C built using ALGOL 60 - Simple and cncise and elegance - Universal - Clse as pssible t mathematical ntatin - Language can describe the algrithms - Mechanically translatable t machine
More informationSystems & Operating Systems
McGill University COMP-206 Sftware Systems Due: Octber 1, 2011 n WEB CT at 23:55 (tw late days, -5% each day) Systems & Operating Systems Graphical user interfaces have advanced enugh t permit sftware
More informationCSE 3320 Operating Systems Synchronization Jia Rao
CSE 3320 Operating Systems Synchrnizatin Jia Ra Department f Cmputer Science and Engineering http://ranger.uta.edu/~jra Recap f the Last Class Multiprcessr scheduling Tw implementatins f the ready queue
More informationUML : MODELS, VIEWS, AND DIAGRAMS
UML : MODELS, VIEWS, AND DIAGRAMS Purpse and Target Grup f a Mdel In real life we ften bserve that the results f cumbersme, tedius, and expensive mdeling simply disappear in a stack f paper n smene's desk.
More informationFrequently Asked Questions
Frequently Asked Questins Date f Last Update: FAQ SatView 0001 SatView is nt pening and hangs at the initial start-up splash screen This is mst likely an issue with ne f the dependency, SQL LcalDB, missing
More informationSetting up the ncipher nshield HSM for use with Kerberized Certificate Authority
Setting up the ncipher nshield HSM fr use with Kerberized Certificate Authrity Intrductin This dcument cntains instructins fr setting up ncipher nshield hardware security mdules (HSM) fr use with the Kerberized
More informationInfrastructure Series
Infrastructure Series TechDc WebSphere Message Brker / IBM Integratin Bus Parallel Prcessing (Aggregatin) (Message Flw Develpment) February 2015 Authr(s): - IBM Message Brker - Develpment Parallel Prcessing
More informationUSER MANUAL. RoomWizard Administrative Console
USER MANUAL RmWizard Administrative Cnsle Cntents Welcme... 3 Administer yur RmWizards frm ne lcatin... 3 Abut This Manual... 4 Setup f the Administrative Cnsle... 4 Installatin... 4 The Cnsle Windw...
More informationUsing SPLAY Tree s for state-full packet classification
Curse Prject Using SPLAY Tree s fr state-full packet classificatin 1- What is a Splay Tree? These ntes discuss the splay tree, a frm f self-adjusting search tree in which the amrtized time fr an access,
More information$ARCSIGHT_HOME/current/user/agent/map. The files are named in sequential order such as:
Lcatin f the map.x.prperties files $ARCSIGHT_HOME/current/user/agent/map File naming cnventin The files are named in sequential rder such as: Sme examples: 1. map.1.prperties 2. map.2.prperties 3. map.3.prperties
More informationsoftpanel generic installation and operation instructions for nanobox products
1 f 10 System Requirements... 3 Installatin... 3 Java... 3 RxTx Serial Drivers... 3 Granting a user permissin t pen a COM Prt in Mac OS X... 3 USB t Serial Drivers... 4 Mac OS X 10.6 Snw Lepard... 4 Operatin...
More informationCounterSnipe Software Installation Guide Software Version 10.x.x. Initial Set-up- Note: An internet connection is required for installation.
CunterSnipe Sftware Installatin Guide Sftware Versin 10.x.x CunterSnipe sftware installs n any system cmpatible with Ubuntu 14.04 LTS server which is supprted until 2019 Initial Set-up- Nte: An internet
More informationDistributed Data Structures xfs: Serverless Network File System
Advanced Tpics in Cmputer Systems, CS262B Prf Eric A. Brewer Distributed Data Structures xfs: Serverless Netwrk File System February 3, 2004 I. DDS Gal: new persistent strage layer that is a better fit
More informationCS4500/5500 Operating Systems Synchronization
Operating Systems Synchrnizatin Yanyan Zhuang Department f Cmputer Science http://www.cs.uccs.edu/~yzhuang UC. Clrad Springs Recap f the Last Class Multiprcessr scheduling Tw implementatins f the ready
More informationMcGill University School of Computer Science COMP-206. Software Systems. Due: September 29, 2008 on WEB CT at 23:55.
Schl f Cmputer Science McGill University Schl f Cmputer Science COMP-206 Sftware Systems Due: September 29, 2008 n WEB CT at 23:55 Operating Systems This assignment explres the Unix perating system and
More informationImplementation of Authentication Mechanism for a Virtual File System
Implementatin f Authenticatin Mechanism fr a Virtual File System Prject fr Operating Systems Curse (CS 5204) Implemented by- Vinth Jagannathan Abhishek Ram Under the guidance f Dr Dennis Kafura Abstract
More informationDB2 10 for z/os System Administration. Day(s): 5. Overview
DB2 10 fr z/os System Administratin Day(s): 5 Curse Cde: CV851G Overview The curse is updated fr DB2 10 fr z/os. This is the Classrm versin f Instructr-led Online Curse (3V851GB). Administratrs f DB2 10
More informationTRAINING GUIDE. Overview of Lucity Spatial
TRAINING GUIDE Overview f Lucity Spatial Overview f Lucity Spatial In this sessin, we ll cver the key cmpnents f Lucity Spatial. Table f Cntents Lucity Spatial... 2 Requirements... 2 Setup... 3 Assign
More informationVulnerability Protection A Buffer for Patching
Vulnerability Prtectin A Buffer fr Patching A Lucid Security Technical White Paper February 2004 By Vikram Phatak, Chief Technlgy Officer Santsh Pawar, Vulnerability Analyst Lucid Security Crpratin 124
More informationLecture Handout. Database Management System. Overview of Lecture. Inheritance Is. Lecture No. 11. Reading Material
Lecture Handut Database Management System Lecture N. 11 Reading Material Database Systems Principles, Design and Implementatin written by Catherine Ricard, Maxwell Macmillan. Overview f Lecture Inheritance
More informationCommon Language Runtime
Intrductin t.net framewrk.net is a general-purpse sftware develpment platfrm, similar t Java. Micrsft intrduced.net with purpse f bridging gap between different applicatins..net framewrk aims at cmbining
More informationHigh Security SaaS Concept Software as a Service (SaaS) for Life Science
Sftware as a Service (SaaS) fr Life Science Cpyright Cunesft GmbH Cntents Intrductin... 3 Data Security and Islatin in the Clud... 3 Strage System Security and Islatin... 3 Database Security and Islatin...
More informationOO Shell for Authoring (OOSHA) User Guide
Operatins Orchestratin Sftware Versin: 10.70 Windws and Linux Operating Systems OO Shell fr Authring (OOSHA) User Guide Dcument Release Date: Nvember 2016 Sftware Release Date: Nvember 2016 Legal Ntices
More informationTL 9000 Quality Management System. Measurements Handbook. SFQ Examples
Quality Excellence fr Suppliers f Telecmmunicatins Frum (QuEST Frum) TL 9000 Quality Management System Measurements Handbk Cpyright QuEST Frum Sftware Fix Quality (SFQ) Examples 8.1 8.1.1 SFQ Example The
More informationAn Introduction to Crescendo s Maestro Application Delivery Platform
An Intrductin t Crescend s Maestr Applicatin Delivery Platfrm Intrductin This dcument is intended t serve as a shrt intrductin t Crescend s Maestr Platfrm and its cre features/benefits. The dcument will
More informationSpin Leading OS Research Astray?
Advanced Tpics in Cmputer Systems, CS262B Prf Eric A. Brewer Spin Leading OS Research Astray? January 27, 2004 I. Extensibility, Safety and Perfrmance in the SPIN Operating System Gal: extensible OS that
More informationLIN101 RS232 / LAN INTERFACE
LIN101 24/02/2004 English 1 1. LIN101 LIN101 is a Serial Device Server, the main functin f the LIN101 is t netwrk-enable existing serial devices. Using the LIN101 yu can add an Ethernet prt practically
More informationEUROPEAN IP NETWORK NUMBER APPLICATION FORM & SUPPORTING NOTES
EUROPEAN IP NETWORK NUMBER APPLICATION FORM & SUPPORTING NOTES T whm it may cncern. Thank yu fr yur request fr an IP netwrk number. Please ensure that yu read the infrmatin belw carefully befre submitting
More informationDesign Patterns. Collectional Patterns. Session objectives 11/06/2012. Introduction. Composite pattern. Iterator pattern
Design Patterns By Võ Văn Hải Faculty f Infrmatin Technlgies HUI Cllectinal Patterns Sessin bjectives Intrductin Cmpsite pattern Iteratr pattern 2 1 Intrductin Cllectinal patterns primarily: Deal with
More informationLinking network nodes
Linking netwrk ndes The data link layer CS242 Cmputer Netwrks The link layer The transprt layer prvides cmmunicatin between tw prcesses. The netwrk layer prvides cmmunicatin between tw hsts. The link layer
More informationIntegration Framework for SAP Business One
Integratin Framewrk fr SAP Business One DIPrxy Cnfiguratin PUBLIC Glbal Rll-ut Octber 2018, B Zha TABLE OF CONTENTS 1 INTRODUCTION... 3 2 INSTALLATION... 3 3 CONFIGURATION... 5 3.1 Services in Service
More informationQuick Start Guide. Basic Concepts. DemoPad Designer - Quick Start Guide
Quick Start Guide This guide will explain the prcess f installing & using the DemPad Designer sftware fr PC, which allws yu t create a custmised Graphical User Interface (GUI) fr an iphne / ipad & embed
More informationIntegrating QuickBooks with TimePro
Integrating QuickBks with TimePr With TimePr s QuickBks Integratin Mdule, yu can imprt and exprt data between TimePr and QuickBks. Imprting Data frm QuickBks The TimePr QuickBks Imprt Facility allws data
More informationLab 5 Sorting with Linked Lists
UNIVERSITY OF CALIFORNIA, SANTA CRUZ BOARD OF STUDIES IN COMPUTER ENGINEERING CMPE13/L: INTRODUCTION TO PROGRAMMING IN C WINTER 2013 Lab 5 Srting with Linked Lists Intrductin Reading This lab intrduces
More informationPAGE NAMING STRATEGIES
PAGE NAMING STRATEGIES Naming Yur Pages in SiteCatalyst May 14, 2007 Versin 1.1 CHAPTER 1 1 Page Naming The pagename variable is used t identify each page that will be tracked n the web site. If the pagename
More informationKaltura MediaSpace TM Enterprise 2.0 Requirements and Installation
Kaltura MediaSpace TM Enterprise 2.0 Requirements and Installatin Updated Aug 30, 2011 Server Requirements Hardware The hardware requirements are mstly dependent n the number f cncurrent users yu expect
More informationOASIS SUBMISSIONS FOR FLORIDA: SYSTEM FUNCTIONS
OASIS SUBMISSIONS FOR FLORIDA: SYSTEM FUNCTIONS OASIS SYSTEM FUNCTIONS... 2 ESTABLISHING THE COMMUNICATION CONNECTION... 2 ACCESSING THE OASIS SYSTEM... 3 SUBMITTING OASIS DATA FILES... 5 OASIS INITIAL
More informationComputer Organization and Architecture
Campus de Gualtar 4710-057 Braga UNIVERSIDADE DO MINHO ESCOLA DE ENGENHARIA Departament de Infrmática Cmputer Organizatin and Architecture 5th Editin, 2000 by William Stallings Table f Cntents I. OVERVIEW.
More informationOn the road again. The network layer. Data and control planes. Router forwarding tables. The network layer data plane. CS242 Computer Networks
On the rad again The netwrk layer data plane CS242 Cmputer Netwrks The netwrk layer The transprt layer is respnsible fr applicatin t applicatin transprt. The netwrk layer is respnsible fr hst t hst transprt.
More informationOracle BPM 10rR3. Role Authorization resolution using groups. Version: 1.0
Oracle BPM 10rR3 Rle Authrizatin reslutin using grups Versin: 1.0 OBPM 10gR3 Rle Authrizatin reslutin using grups Cntents Intrductin... 3 Sme BPM & LDAP cncepts... 4 Cnfiguring OBPM t use different grup
More information1 Version Spaces. CS 478 Homework 1 SOLUTION
CS 478 Hmewrk SOLUTION This is a pssible slutin t the hmewrk, althugh there may be ther crrect respnses t sme f the questins. The questins are repeated in this fnt, while answers are in a mnspaced fnt.
More informationDocAve 6 Granular Backup and Restore
DcAve 6 Granular Backup and Restre User Guide Service Pack 3 Revisin H Issued August 2013 1 Table f Cntents Abut DcAve Granular Backup and Restre... 5 Cmplementary Prducts... 5 Submitting Dcumentatin Feedback
More informationE. G. S. Pillay Engineering College, Nagapattinam Computer Science and Engineering
IT2042 - Infrmatin Security 1-1 E. G. S. Pillay Engineering Cllege, Nagapattinam Cmputer Science and Engineering Elective II IT 2042 INFORMATION SECURITY VIII Sem CSE QUESTION BANK - UNIT-IV 1) What is
More informationCCNA Security v2.0 Chapter 2 Exam Answers
CCNA Security v2.0 Chapter 2 Exam Answers 1. An administratr defined a lcal user accunt with a secret passwrd n ruter R1 fr use with SSH. Which three additinal steps are required t cnfigure R1 t accept
More informationFIREWALL RULE SET OPTIMIZATION
Authr Name: Mungle Mukupa Supervisr : Mr Barry Irwin Date : 25 th Octber 2010 Security and Netwrks Research Grup Department f Cmputer Science Rhdes University Intrductin Firewalls have been and cntinue
More informationORGANIZING HARD DRIVES IN A "WINDOWS 10" OR "WINDOWS 8.1" COMPUTER
ORGANIZING HARD DRIVES IN A "WINDOWS 10" OR "WINDOWS 8.1" COMPUTER Web lcatin fr this presentatin: http://aztcs.rg Click n Meeting Ntes 2 SUMMARY Yu can use the bundled "Strage Spaces" applet inside a
More informationUnderstanding Active Directory Domain Services (AD DS) Functional Levels
Understanding Active Directry Dmain Services (AD DS) Functinal Levels 92 ut f 99 rated this helpful - Rate this tpic Updated: May 28, 2014 Applies T:,,, Functinal levels determine the available Active
More informationip.buffer App Note AN009 : Security Considerations
ip.buffer App Nte AN009 : Security Cnsideratins Date Authr Release 2008-12-18 MP Initial draft UK 2008 Scannex Electrnics Limited. All rights reserved wrldwide. Scannex Electrnics Ltd, UK t: +44(0)8707
More informationIT Essentials (ITE v6.0) Chapter 8 Exam Answers 100% 2016
IT Essentials (ITE v6.0) Chapter 8 Exam Answers 100% 2016 1. A user ntices that the data transfer rate fr the gigabit NIC in the user cmputer is much slwer than expected. What is a pssible cause fr the
More informationB Tech Project First Stage Report on
B Tech Prject First Stage Reprt n GPU Based Image Prcessing Submitted by Sumit Shekhar (05007028) Under the guidance f Prf Subhasis Chaudhari 1. Intrductin 1.1 Graphic Prcessr Units A graphic prcessr unit
More informationDue Date: Lab report is due on Mar 6 (PRA 01) or Mar 7 (PRA 02)
Lab 3 Packet Scheduling Due Date: Lab reprt is due n Mar 6 (PRA 01) r Mar 7 (PRA 02) Teams: This lab may be cmpleted in teams f 2 students (Teams f three r mre are nt permitted. All members receive the
More informationExperience With Processes and Monitors in Mesa
Advanced Tpics in Cmputer Systems, CS262A Prf. Eric Brewer Experience With Prcesses and Mnitrs in Mesa I. Experience With Prcesses and Mnitrs in Mesa Fcus f this paper: light-weight prcesses (threads in
More informationABELMed Platform Setup Conventions
ABELMed Platfrm Setup Cnventins 1 Intrductin 1.1 Purpse f this dcument The purpse f this dcument is t prvide prspective ABELMed licensees and their hardware vendrs with the infrmatin that they will require
More informationComputer Organization and Architecture
Campus de Gualtar 4710-057 Braga UNIVERSIDADE DO MINHO ESCOLA DE ENGENHARIA Departament de Infrmática Cmputer Organizatin and Architecture 5th Editin, 2000 by William Stallings Table f Cntents I. OVERVIEW.
More informationHP Server Virtualization Solution Planning & Design
Cnsulting & Integratin Infrastructure Services HP Server Virtualizatin Slutin Planning & Design Service descriptin Hewlett-Packard Cnsulting & Integratin Infrastructure Cnsulting Packaged Services (HP
More informationJava Programming Course IO
Java Prgramming Curse IO By Võ Văn Hải Faculty f Infrmatin Technlgies Industrial University f H Chi Minh City Sessin bjectives What is an I/O stream? Types f Streams Stream class hierarchy Cntrl flw f
More informationMilestone XProtect. NVR Installer s Guide
Milestne XPrtect NVR Installer s Guide Target Audience fr this Dcument This guide is relevant fr peple respnsible fr delivering and installing Milestne XPrtect NVR surveillance systems. If yu are a Milestne
More informationAdverse Action Letters
Adverse Actin Letters Setup and Usage Instructins The FRS Adverse Actin Letter mdule was designed t prvide yu with a very elabrate and sphisticated slutin t help autmate and handle all f yur Adverse Actin
More informationThe following screens show some of the extra features provided by the Extended Order Entry screen:
SmartFinder Orders Extended Order Entry Extended Order Entry is an enhanced replacement fr the Sage Order Entry screen. It prvides yu with mre functinality while entering an rder, and fast access t rder,
More information1 Binary Trees and Adaptive Data Compression
University f Illinis at Chicag CS 202: Data Structures and Discrete Mathematics II Handut 5 Prfessr Rbert H. Slan September 18, 2002 A Little Bttle... with the wrds DRINK ME, (r Adaptive data cmpressin
More informationUPGRADING TO DISCOVERY 2005
Centennial Discvery 2005 Why Shuld I Upgrade? Discvery 2005 is the culminatin f ver 18 mnths wrth f research and develpment and represents a substantial leap frward in audit and decisin-supprt technlgy.
More informationYou need to be able to define the following terms and answer basic questions about them:
CS440/ECE448 Fall 2016 Midterm Review Yu need t be able t define the fllwing terms and answer basic questins abut them: Intr t AI, agents and envirnments Pssible definitins f AI, prs and cns f each Turing
More informationUpgrading Kaltura MediaSpace TM Enterprise 1.0 to Kaltura MediaSpace TM Enterprise 2.0
Upgrading Kaltura MediaSpace TM Enterprise 1.0 t Kaltura MediaSpace TM Enterprise 2.0 Assumptins: The existing cde was checked ut f: svn+ssh://mediaspace@kelev.kaltura.cm/usr/lcal/kalsurce/prjects/m ediaspace/scial/branches/production/website/.
More informationDemand Forecasting. For. Microsoft Dynamics 365 for Operations. Technical Guide. Release 7.1. December 2017
Demand Frecasting Fr Micrsft Dynamics 365 fr Operatins Technical Guide Release 7.1 December 2017 2017 Farsight Slutins Limited All Rights Reserved. Prtins cpyright Business Frecast Systems, Inc. This dcument
More informationPriasoft Migration Suite Setup
Priasft Migratin Suite Setup Backgrund The Priasft Migratin Suite fr Exchange is a pwerful and easy slutin fr Exchange-t-Exchange and Exchange-t-Office365 migratins. One f the first tasks prir t migratin
More informationEnabling Your Personal Web Page on the SacLink
53 Enabling Yur Persnal Web Page n the SacLink *Yu need t enable yur persnal web page nly ONCE. It will be available t yu until yu graduate frm CSUS. T enable yur Persnal Web Page, fllw the steps given
More informationDepartment of Computer Information Systems KEMU
Advanced DBMS: CISY 423 Department f Cmputer Infrmatin Systems KEMU Database Security OBJECTIVES Database Security and Authrizatin Database Users Creating Users/Accunts in cmmercial DBMS Discretinary Access
More informationIMPORTING INFOSPHERE DATA ARCHITECT MODELS INFORMATION SERVER V8.7
IMPORTING INFOSPHERE DATA ARCHITECT MODELS INFORMATION SERVER V8.7 Prepared by: March Haber, march@il.ibm.cm Last Updated: January, 2012 IBM MetaData Wrkbench Enablement Series Table f Cntents: Table f
More informationInformationNOW Elementary Scheduling
InfrmatinNOW Elementary Scheduling Abut Elementary Scheduling Elementary scheduling is used in thse schls where grups f students remain tgether all day. Fr infrmatin regarding scheduling students using
More informationArius 3.0. Release Notes and Installation Instructions. Milliman, Inc Peachtree Road, NE Suite 1900 Atlanta, GA USA
Release Ntes and Installatin Instructins Milliman, Inc. 3424 Peachtree Rad, NE Suite 1900 Atlanta, GA 30326 USA Tel +1 800 404 2276 Fax +1 404 237 6984 actuarialsftware.cm 1. Release ntes Release 3.0 adds
More informationWEB LAB - Subset Extraction
WEB LAB - Subset Extractin Fall 2005 Authrs: Megha Siddavanahalli Swati Singhal Table f Cntents: Sl. N. Tpic Page N. 1 Abstract 2 2 Intrductin 2 3 Backgrund 2 4 Scpe and Cnstraints 3 5 Basic Subset Extractin
More informationBackup your Data files before you begin your cleanup! Delete General Ledger Account History. Page 1
Database Clean-up (Optinal) The fllwing items can be dne at ANY time during yur Fiscal Year. Befre yu start yur Database Clean-up, please verify that yu are n the mst recent versin f Eclipse. If yu see
More informationLink-layer switches. Jurassic Park* LANs with backbone hubs are good. LANs with backbone hubs are bad. Hubs, bridges, and switches
Link-layer switches Jurassic Park* Hubs, bridges, and switches CS4 Cmputer Netwrks Department f Cmputer Science Wellesley Cllege *A multi-tier hub design. Switches 0- LANs with backbne hubs are gd. Prvide
More informationManual for installation and usage of the module Secure-Connect
Mdule Secure-Cnnect Manual fr installatin and usage f the mdule Secure-Cnnect Page 1 / 1 5 Table f Cntents 1)Cntents f the package...3 2)Features f the mdule...4 3)Installatin f the mdule...5 Step 1: Installatin
More informationCCNA 1 Chapter v5.1 Answers 100%
CCNA 1 Chapter 11 2016 v5.1 Answers 100% 1. A newly hired netwrk technician is given the task f rdering new hardware fr a small business with a large grwth frecast. Which primary factr shuld the technician
More informationDelete General Ledger Account History
Database Clean-up (Optinal) The fllwing items can be dne at ANY time during yur Fiscal Year. Befre yu start yur Database Clean-up, please verify that yu are n the mst recent versin f Eclipse. If yu see
More information