CS 470 ­ Operating Systems Spring 2014 – Final Exam Review Sheet

advertisement
CS 470 ­ Operating Systems
Spring 2014 – Final Exam Review Sheet
The Final Exam will be on Monday, May 5, 2:00pm­4:00pm. You may bring one 8.5in x 11in sheet of paper with (your own, not anyone else's) notes on one side to the exam. You may print out the sheet, but it must be in a 10­
point font or larger. E.g., please do not photoreduce or print 4 pages on a side. If you handwrite your notes, they may be as small as you like. You may handwrite notes in the margins of a printout. You may bring a calculator. The exam will be cumulative and comprehensive. About two­thirds of the exam will consist of questions on the material in the second half of the semester similar to the homework problems. The other one­third of the exam will be 20­40 multiple choice or true/false questions covering material over the first half of the semester. Questions will be both concept questions, especially emphasizing differences in related concepts, and application of algorithm questions.
Consult the previous review sheets for topics covered in the first half of the semester. Topics from the second half of the semester are given below, but this is in no way to be construed as an exclusive list. Disk systems (Chapter 9) and I/O systems (Chapter 12) definitely will not be on the exam.
1. Real (i.e., static, complete allocation) memory management techniques. Contiguous and non­contiguous allocation strategies including paging and segmentation. Computation of effective memory access time.
2. Demand paging and virtual memory including the issues of page faults, page replacement algorithms, locality and working sets, and thrashing. Computation of effective memory access time.
3. File systems ­ API and implementation, backup and restoration schemes
4. Protection ­ difference from security; protection domains, access matrices and access lists; Unix file protection scheme
5. Security ­ difference from protection; program threats such as Trojan horse, trapdoor, stack and buffer overflow, viruses; network threats such as worms, port scanning, denial of service; user authentication methods such as passwords, biometrics
6. Case studies ­ general concepts related to operating systems for mobile hardware and applications (i.e., nothing specific about a particular operating system)
04/28/2014
Page 1 of 1
D. Hwang
Download