stationasebo.blogg.se

Cyber security courses open university
Cyber security courses open university









  1. Cyber security courses open university how to#
  2. Cyber security courses open university software#

  • analyze the effect of page size in process operation and page table size, and justify a choice made for a certain page size.
  • simulate at algorithm level the address translation in (multi-level) paged VM system.
  • describe multi-level paged VM operation.
  • describe the general principles of implementing virtual memory (VM) together with the key concepts (paging, page table, address translation, translation lookaside buffer, page faults).
  • Cyber security courses open university how to#

    explain how deadlock can be detected using DDA-algorithm, how to recover from deadlock, and how a deadlock can be prevented using, e.g., banker's algorithm.apply concurrency handling mechanisms to solve practical problems.explain the semaphore and monitor structures, and use them correctly in problem solving.design a solution to critical section problem using the most appropriate method, e.g., interrupt disabling, busy-wait, semaphore, monitor, messages.describe the occurrence of a deadlock and explain necessary and sufficient conditions for a deadlock to occur.explain the basic concurrency problems: critical section problem, turn ticket, readers-writers, producer-consumer, client-server, and boom synchronization.explain the basic concepts of concurrent execution: atomicity, critical section, synchronization, communication, deadlock.explain the requirements for concurrency solutions (e.g., in terms of correctness in all scenarios) and finding a scenario leading to failed outcome.explain the advantages, disadvantages, implementation levels, and methods of concurrency.explain the nondeterministic nature of process execution and its implications.provide examples of common problems that may results in an incorrect concurrent solution.explain the importance of different scenarios when examining the execution of concurrent programs.

    Cyber security courses open university software#

    explain the need for concurrency using examples illustrating concurrent operations of hardware and software level.explain how shared memory and other methods are used for process and thread communication.choose (and justify the choice) the most practical way to execute threads for given software system.compare the suitability of different scheduling algorithms on different work loads.describe basic process scheduling techniques in uniprocessor, multiprocessor, and real-time systems.describe different types of thread execution (user-level, kernel-level).describe different methods to protect processes and the use of different processor states (user/privileged) for that purpose.describe the control systems and process and thread management.describe the structure and the functionalities of operating systems.describe the position of OS in modern data processing environment.describe the essential structures of an OS together with their interfaces.summarize the key services of an operating system (OS) and their operation.











    Cyber security courses open university