Test your knowledge with these true/false statements from the CEG 2350 final exam. Topics include cryptography, process scheduling, virtual machines, file systems, and more.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
NOTE: THE ANSWERS ARE MARKED IN YELLOW Question 1 Which of the following is true? A) SHA-2 is a set of cryptographic hash functions designed by the U.S. National Security Agency (NSA) and published in 2001 by the National Institute of Standards and Technology (NIST) as a U.S. Federal Information Processing Standard (FIPS). B) SHA-2 digests (checksums) are 224, 256, 384 or 512 bits. C) We should unquestioningly trust NSA provided cryptographic hash functions because the NSA has never hidden "back doors" to enable easy unauthorized decryption by governmental organizations. D) Carnegie Mellon University (CMU) Software Engineering Institute (SEI) now says that SHA-2 "should be considered cryptographically broken and unsuitable for further use.” Question 1 options: C, and D A and B A, B, and D A, B, and C Question 2 Which of the following may operating system process/thread schedulers attempt to optimize? A) CPU Utilization: Percent of time that the CPU is running threads B) CPU Throughput: Number of completed “operations” per second. C) Turnaround time: Process end time – Process start time. D) Response time: Minimize total time process waits while ready to run E) Waiting time: Minimize total time process spends not ready to run F) Efficiency: Conserve power or other resources G) Latency: Minimize (or standardize) process response times
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
H) Fairness: Distribute resources to processes equitably Question 2 options: All but B All but H All of them Only H Question 3 Which of the following statements istrue? You may select more than one. Question 3 options: A ) In many file system designs, there are two kinds of fragmentations possible. (i) File content is stored in disk blocks. File content is seldom an exact multiple of disk blocks, so the last block used is almost never full. This is known as internal fragmentation. (ii) Large files are almost always stored in non-consecutive blocks scattered around non-volatile memory. This is known as external fragmentation. B ) sudo apt-get updateupdates the locally stored database of what applications are installed and what newer versions are now available.sudo apt-get updatereplaces older applications with newer ones.
C)In Debian Linux version like Lubuntu,sudo apt-get install nameOfThePackage installs the package;sudo apt-get remove nameOfThePackage uninstalls it. The commanddpkg -llists all the packages installed. D)In Windows, software is packaged in a file format known as.msi, andmsiexec.exeinstalls such packages. When you double-click on a.msifile, the Graphical User Interface (GUI) front-end of this program is invoked by association. Themsiexecprogram has many command-line switches not available through the GUI. Question 4 Which of the following statements are true? A) Any type of file on a computer can be placed under version control. B) SCCS, CVS, RCS, SVN, and GIT are all version control tools. C) All version control tools require "check out" and "check in" of files to prevent simultaneous edits to the same file by different users. D) Version control systems are useful for projects implemented by a single person. Question 4 options: A and B
A, B, and C A, B, and D A and C Question 5 Which of the following statements are true? A) A router is a networking device that forwards data packets between computer networks. Routers perform the traffic directing functions on the Internet. B) An Ethernet hub is a network hardware device for connecting multiple Ethernet devices together and making them act as a single network segment. It has multiple input/output (I/O) ports, in which a signal introduced at the input of any port appears at the output of every other port. C) An Internet Service Provider (ISP) is an organization that provides services for accessing and using the Internet. D) The Domain Name System (DNS) is a decentralized naming system for computers, services, or any resource connected to the Internet. It translates domain names to the numerical IP addresses needed for the purpose of locating and identifying computer services and devices with the underlying network protocols. E) In a man-in-the-middle attack, the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other. A man-in-the-middle attack can be used to circumvent asymmetric cryptographic protocols. Question 5 options: A, D, E B, C, E A, B, C, D A, B, C B, C, D
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Question 6 Which of the following statements are true? A) A child process usually “inherits” the run time environment/permissions of the parent process that starts it. B) Child processes return status to the parent when the child terminates. C) Child processes terminate if the parent terminates unless the child is detached from its parent. D) A shell is usually the parent of each process started by the shell. Question 6 options: B, C, and D A, B, and C A, B, C, and D C, and D Question 7 Which of the following statements are true about FIFO (Batch) Process Scheduling? A) FIFO (Batch) Process Scheduling is not preemptive. B) FIFO (Batch) Process Scheduling is not equitable (one process may hog the CPU). C) Latency of queued process start is often unpredictable D) Most modern operating systems use FIFO (Batch) Process Scheduling because it is very efficient.
Question 7 options: Only C Only D A, B, and D A, B, and C Question 8 Which of the following statements are true? A) Multi-user systems have user accounts to enable accounting, security, logging, and resource management per user. B) Multi-user systems correlate usernames with user IDs. C) File ownership may be correlated with a user ID. D) Multi-user systems may require user login and authentication to determine authorization/permission to access system resources. E) Modern versions of the Windows operating systems are roughly equivalent to a single-user, single-account operating systems; this means that allprocessescan modify the boot sector and perform other low-level hard drive modifications. This enables viruses and other clandestinely installed software to integrate themselves with the operating system in a way that is difficult to detect or undo. Question 8 options: A, B, D, and E Only E A, B, C, and D A, B, C, D, and E Question 9
Which of the following statements istrue? You may select more than one. Question 9 options: A ) Many modern CPUs provide hardware level support/optimization for virtualization and creation of Virtual Machines. B ) A hypervisor is a virtualization technique. C)Python is a scripting language commonly on Linux based systems. D)The Java Virtual Machine (JVM) is a complete system emulation and usually hosts a guest operating system. Question 10 Which of the following regular expressions only matches variable names with all of the following rules? 1) Variable names must start with an alphabetic character or an underscore. 2) If a variable name starts with an underscore, the variable name must include at least one alphabetic character. 3) Variable names may include numbers at any position after the start. Note: This question has one of the lowest correct answer rates of any question used in CEG2350 exams. Why is this? If the answer isn't obvious to you just by looking at the options, why don't you create some test cases and actually test each of the candidate regular expressions? Question 10 options: 1 and 3
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
(^[a-zA-Z][a-zA-Z0-9_]*)|(^[_]+[0-9]*[a-zA-Z]+[a-zA-Z0-9_]*) (.[a-zA-Z][a-zA-Z0-9_]*)|(^[_]+[a-zA-Z0-9_]*) (^[a-zA-Z][a-zA-Z0-9_]*)|(^[_]+[a-zA-Z0-9_]*) (.[a-zA-Z][a-zA-Z0-9_]*)|(^[_]*[a-zA-Z0-9_]$) Question 11 Which of the following statements are true? A) A virtual machine (VM) is a software implementation of a machine (i.e. a computer) that executes programs like a physical machine. B) Virtual machines enable multiple OS environments co-existing on the same computer in strong isolation from each other. C) The terms "virtual Machine" and "virtual memory" refer to the same concept. D) Virtual machines may emulate an instruction set architecture (ISA) different from that of the host machine. E) The “host” operating system controls the physical hardware. One or more “guest” operating systems control virtual hardware. Question 11 options: A, B, C, and D A and E A, B, and C A, B, D, and E Question 12 Which of the following statements are true?
A) A page fault is a type of fault detected by computer hardware when a running program accesses a memory page that is mapped into the virtual address space, but not actually loaded into main memory. Software that handles page faults is generally a part of the operating system. When handling a page fault, the operating system generally tries to make the required page accessible at the location in physical memory or terminates the program in case of an illegal memory access. B) A segmentation fault is a type of fault detected by computer hardware with memory protection to notify an operating system (OS) about a memory access violation. The OS will, in response, usually perform some corrective action, generally passing the fault on to the offending process or causing abnormal termination of the process. C) A segmentation fault occurs when a program attempts to access a memory location that it is not allowed to access, or attempts to access a memory location in a way that is not allowed e.g. attempting to write to a read-only location or fetch an instruction from non-executable memory. D) A bus error is a type of fault detected by computer hardware to notify an operating system (OS) that a process is trying to access memory that the CPU cannot physically address i.e. an invalid address for the address bus. In modern use on most architectures these are much rarer than segmentation faults, which occur primarily due to memory access violations. E) Computer applications make a call using the application programming interface (API) to access shared resources, like the keyboard, mouse, screen, disk drive, network, and printer. These can fail in two ways: Blocked Calls or Faults. A blocked call is a request for services from the operating system that halts the computer program until results are available. Faults originate from API calls, from the operating system, and from other applications, and typically, any fault that is not handled by an application causes premature application termination. Fault-tolerant software continues to meet operational requirements in spite of the possibility of blocking and faults. Question 12 options: A, C, D A, B, C, D, E A, E B, E A, B, C, E Question 13 Which of the following statements are true?
A) MD5 is a cryptographic hash function producing a 128-bit (16-byte) hash value, typically expressed in text format as a 32 digit hexadecimal number. B) MD5 is used to verify data integrity. C) MD5 was designed by Ron Rivest in 1991. D) It is exceedingly unlikely for two files with different contents to unintentionally have the same MD5 hash value, but two files with different contents may be deliberately crafted to have the same MD5 hash value. E) The CMU Software Engineering Institute considers MD5 essentially "cryptographically broken and unsuitable for further use". Question 13 options: A, B, C, D, and E A C and E Only E A and B B and C Question 14 Which of the following statements are true? A) Different command line shells interpret different programming languages B)kshis a shell available on some Unix systems C)tclshis a shell that interprets theTCLlanguage
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
D) Shells may be graphical and use a mouse. Question 14 options: B, C, and D A, B, and D C and D A, B, C, and D A, B, and C Question 15 Which of the following statements are true? A) A blocked process is not ready to run until some condition is met. B) A process may block until an I/O operation completes. C) A process may block until a timer expires. D) A process may block until exclusive access to a resource is obtained. E) Processes never block. Question 15 options: Only A A, B, and D Only E A, B, C, and D Question 16
Bashis a Turing Complete programming environment, and give sufficient time and memory,Bashcould be used to implement aJava Virtual Machine. Question 16 options: True False Question 17 Which of the following are true? A)Filesare collections of bytes associated with metadata. B) Files may be stored inpersistent memory C) Files may be stored in volatile memory D) Files are not the only way to organize and store information Question 17 options: A, B, C and D B and C C and D A and B Question 18 The termsendianandendiannessrefer to the convention used to interpret the bytes making up a data word when those bytes are stored in computer memory or transmitted over a network. In computing, memory commonly stores binary data by organizing it into 8-bit units called bytes. Each byte has a unique address. When reading or writing a data word consisting of multiple such units, the order of the bytes stored in memory determines the interpretation of the data word. Endianness refers to the question: Does the most significant byte of a multi-byte word have a lower address (come first) or a higher address (come after) the least significant byte. Question 18 options:
True False Question 19 Which of the following statements are true. A) The network access features of operating systems are typically implemented following some variation of the Open Systems Interconnection (OSI) 7-layer model. B) An abstraction layer or abstraction level is a way of hiding the implementation details of a particular set of functionality to allow separation of concerns to facilitate interoperability and platform independence C) "All problems in computer science can be solved by another level of abstraction ... except for the problem of too many layers of abstraction." D) Encapsulation is a method of designing modular communication protocols in which logically separate functions in the network are abstracted from their underlying structures by inclusion or information hiding within higher level objects. Using encapsulation, each layer of abstraction adds a header (and sometimes trailer) to the layer above. For example, in the Internet protocol suite, the contents of a web page are encapsulated with an HTTP header, then by a TCP header, an IP header, and, finally, by a frame header and trailer. The result of encapsulation is that each lower layer provides a service to the layer or layers above it. E) In telecommunications and computer networks, multiplexing is a method by which multiple analog or digital signals are combined into one signal over a shared medium e.g. several telephone calls may be carried using one wire and data packets from many senders may be sequentially transmitted over a shared wire or radio frequency. Question 19 options: B, C, D A, B, C, D, E A, C, E A, B, C C, D, E Question 20
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Which of the following statements are true? A) The Java Virtual Machine (JVM) translates byte codes into native machine code “on the fly” “just in time” and then executes the native machine code. B) Just in Time (JIT) compiling can produce faster program execution than other compilation technologies. C) Just in Time (JIT) compiling always produces faster program execution than other compilation technologies. D) Dynamic programming languages like Python can not be implemented with Just in Time (JIT) compiling. Question 20 options: B and C A, B, C, and D A and B A and D Question 21 Which of the following are uses of a checksum? A) Detect single bit error/corruption in a stream of bits with unknown length B) Detection multi-bit error/corruption within a data file C) Encryption of a data file D) Detection of single bit error/corruption within a data file Question 21 options:
A, C, and D A, B, C, and D Only D A and D Only C B, C, and D B and D Question 22 Which of the following statements istrue? You may select more than one. Question 22 options: A ) Your instructor claims that Linux is a popular platform for research into operating systems, developer tools, user interfaces, and Internet services. B ) Unix is a trademark. Operating system vendors must pay a license and conform to certain technical standards in order to call their operating system Unix. C)Linux is available in many different configurations called “distributions.” Various distributions organize files slightly differently and provide different
default programs for tasks such as web browsing, email, command line interfaces, and software development. D)Linux is an Open Source operating system similar to the famous Unix operating system. Question 23 Which of the following statements is true? A) Without a trusted certificate verifying the identity of a communication partner, a "Man in the Middle" attack is possible even when using asymmetric key cryptography. B) For more than one person to decrypt a file encrypted with symmetric key cryptography, it is usually necessary for more than one person to know the encryption key. C) It is probably not possible to create an encryption system that lets good guys decrypt the communications of bad guys without also allowing bad guys to decrypt communication between good guys. D) RSA encryption does not have flaws that have been exploited by governments to detain and/or kill political dissidents. E) RSA encryption is broken by design Ref: https://www.wired.com/2013/09/nsa-backdoor/ Question 23 options: A, B, C, E A, B, C, D A, B, C, D, E C, E
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
B, D Question 24 Which of the following statements are true? A) The physical layer defines the means of transmitting raw bits rather than logical data packets over a physical link connecting network nodes. The bit stream is converted to a physical signal that is transmitted over a hardware transmission medium such as Ethernet or WiFi or Bluetooth. The physical layer provides an electrical and mechanical interface to the transmission medium. B) The data link layer transfers data between nodes on the same network. The data link layer is concerned with local delivery of frames that do not cross the boundaries of a local network. Inter-network routing and global addressing are higher-layer functions, allowing data-link protocols to focus on local delivery. C) The network layer is responsible Internet Protocol (IP) packet formation and for packet forwarding including routing through intermediate routers based on knowledge of the network addresses of neighboring network nodes. IP is connectionless in that a datagram can travel from a sender to a recipient without the recipient having to send an acknowledgement. Connection-oriented protocols exist at other, higher layers of the OSI model. D) The transport layer provides services such as connection-oriented data stream support, reliability, flow control, and multiplexing. The best- known transport protocol is Transmission Control Protocol (TCP) used for connection-oriented transmissions, whereas the connectionless User Datagram Protocol (UDP) is used for simpler messaging transmissions. E) The application layer contains the communications protocols and interface methods used in process-to-process communications across a computer network. The application layer is implemented in each application as a way of interpreting or decoding payload data transmitted using other OSI layers. Hyper Text Transfer Protocol (HTTP), File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP), and Remote Procedure Call (RPC) are all examples of application layer protocols. F) A protocol is a set of of rules that facilitate communication between two or more entities. Data exchanged has to be evaluated in the context of ongoing communication, and a protocol defines the data structures and processes used to perform the evaluation. Question 24 options: A, B, C, D, E, F A, C, E B, D, F F
A, B, C, D, E Question 25 Which of the following statements are true? A) Processes data structures store information about security and permissions. B) Operating systems can halt processes and resume them later. C) Operating systems can halt threads and resume them later. D) Multitasking (time share) operating systems schedule processes and/or threads to run. Question 25 options: Only D B, C, and D C and D A, B, C, and D Question 26 Which of the following are possible states for a process? A) Ready to run B) Running C) Halted/Blocked
D) Zombie: a process that has completed execution but still has an entry in the process queue/table. The entry is needed to allow the parent process to read its child's exit status. Question 26 options: Only B A, and B A, B, C, and D A, B, and C Question 27 Which of the following statements are true? A) Researchers successfully faked Secure Socket Layer (SSL) certificates prior to revelation of the "Heartbleed" bug. B) As early as In 1996, cryptographers began recommending the use of other algorithms other than MD5 such as SHA-1. C) SHA-1 has been proven vulnerable tolength-extensionand partial-message collision attacks. D) The RSA crypto-system is used for most privacy sensitive electronic commercial communications because it has not been broken. Question 27 options: A, B, and C A, B, C, and D A A and B
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Question 28 Which of the following statements is true? A) A File System controls how information is stored and retrieved in either volatile or non-volatile memory. B) A database may be implemented using files. C) A file system may be implemented using a database. D) Databases and file systems are the same thing. Question 28 options: A, B, and C A, B, C, and D B and C A, C, and D Question 29 Which of the following statements are true? A) Most modern operating systems use a hardware Memory Management Unit (MMU) to segment the portions of main memory allocated to each process. Different memory segments serve different purposes in running programs. B) The Stack memory is used to hold temporary values, storage for function or method local variables, function or method arguments, function or method return addresses. Stack memory enables recursive function or method calling. C) Stack memory is a finite resource, and any program that attempts to use more stack memory than is available experiences a "stack overflow". Stack overflow is typically a very serious bug that will either corrupt program data or cause a program to terminate abnormally.
D) Static memory may not contain storage for variables that change value as a program executes. That's why it's called "static". E) Static memory is called "static" because they is a fixed amount of it reserved when a program is loaded into memory, and the amount is "static" meaning is does not increase or decrease in amount as a program executes. F) Code segments provide storage for machine instructions. Code segments are often protected so that machine instructions within code segments may not be modified as a program executes. G) Operating systems may share code segments between separate processes e.g. there may be only one copy of instructions comprising standard library functions even if many programs loaded into memory use the library functions. H) Heap segments store memory that may be dynamically allocated as a program executes. For example, when the "new" key word is used in Java, it usually indicates that additional memory must be reserved from the Heap. Question 29 options: B, D, F, H A, C, E, G A, B, C, E, F, G, H E, F, G, H A, B, C, D Question 30 Which of the following statements is true? Question 30 options: IPv4 defines more than 4 billion internet routable addresses. All internet routers support both IPv4 and IPv6. Each IPv4 address identifies exactly one computer.
IPv4 uses 16 bits for each address, and IPv6 uses 128 bits for each address. Question 31 Which of the following statements are true? A) In most modern operating systems, processes are subdivided into one or more “threads” of execution. B) A thread is a sequence of instructions and some information similar to a process. C) Threads have historically been called “light weight processes” D) Computers with more than one processor or processor “cores” can execute more than one thread at a time. Question 31 options: A, B, and C B, C, and D A, B, C, and D A and B Question 32 Which of the following are reasons to use version control? A) Record changes to files along with who made the changes and comments explaining the reasons for the changes.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
B) Recover previous versions of files. C) Coordinate or prevent simultaneous changes to the same file by multiple people. D) Share the latest versions of files with multiple people at multiple sites. E) Publish files for access by anyone over the Internet. F) Automatically build multiple versions of an executable program. Question 32 options: A ) Only F B ) A and F C)A, B, C, D, and E D)A, B, C, and E
E)A, B, and C F)Only B Question 33 Which of the following statements are true? A) Machine instructions are numbers that are decoded by a processor. Each instruction typically uses a subset of bits to store an opcode which identifies the operation to be performed such as adding or multiplying or shifting data bits. B) Assembly languages typically use human readable words, mnemonics, that have a 1::1 correspondence with the valid opcodes in machine languages. C) Each instruction typically uses a subset of bits to identify the operands of an operation such as source and destination registers for computations. D) An assembler is a program that translates an assembly language program into a machine language program. E) A compiler is a program that translates one programming language into another. Some compilers translate high level programming languages into assembly language that must be processed by an assembler to produce machine language. Other compilers translate high level programming languages directly into machine language. F) Java byte codes are a machine language for a virtual machine. To execute a Java program on common computers, the byte codes must be translated into machine instructions for a real (not virtual) machine. Question 33 options: A, B, D, E, F A, B, C B, D, F Only E
A, B, C, D, E, F Question 34 Which of the following statements are true? A) Translation Look-aside Buffer (TLB) is a memory area that is part of a Memory Management Unit (MMU) used to translate virtual memory addresses into physical memory addresses. B) A page table is the data structure used by a virtual memory system in a computer operating system to store the mapping between virtual addresses and physical addresses. C) Virtual memory is a memory management technique that maps memory addresses used by a program, called virtual addresses, into physical addresses in computer memory. An operating system manages virtual address spaces and the association of real memory to virtual memory. An operating system may provide a virtual address ranges that can exceed the capacity of real memory and allow processes to reference more main memory than is physically present in the computer. D) Virtual memory may be used with a paging technique by which a computer stores and retrieves data from secondary storage for use in main memory. The acts of copying data in a physical page of memory to secondary storage and copying other data from secondary storage into a physical page of memory is called swapping. Frequent swapping is called thrashing, and it drastically reduces aggregate system performance. E) Swapping may be used by Virtual memory systems to change the mapping from virtual memory to physical memory as a process executes and simulate the availability of more main memory than is physically present in the computer. Question 34 options: B, C, D, E A, C, E A, B, C A, B, C, D, E
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
B, D Question 35 Which of the following statements are true? A) State diagrams are used to give an abstract description of the behavior of a system. This behavior is analyzed and represented as a series of events that can occur in one or more possible states. B) All problems can be described using a finite number of states and state transitions. C) Central Processing Units (CPUs) are finite sate machines. D) The possible states of a user process include Ready, Running, Blocked, and Zombie. E) A Turing Machine is a mathematical description of a computer that is capable of solving any problem solvable by any other machine. Question 35 options: B, D A, C, D, E A, C, E A, B, C, D, E Question 36 Which of the following statements are true? A) A Cyclic Redundancy Check (CRC) is similar to a checksum and may be used in any situation where a checksum may be used. B) A Cyclic Redundancy Check may detect single bit errors in a stream of bits with unknown length.
C) It is not possible for two files containing different bit patterns to have the same Cyclic Redundancy Check value. D) A Cyclic Redundancy Check encrypts file contents. Question 36 options: Only C Only A A, B, and C A, B, C, and D B, C, and D Only B Question 37 Which of the following statements are true? A) The Open Systems Interconnection (OSI) model (ISO/IEC 7498-1) contains 7 layers B) The standard Unix command, ping, is used to determine whether there is a route between a sender and any specified destination address. C) Computers accessible via the Internet can not have the ping service disabled. D) The standard Unixtraceroutecommand identifies the sequence of computers and routers through which a packet traveled. Question 37 options: A, C, and D
A, B, C, and D B, C, and D A, B, and D Question 38 When programming with the Sockets Application programming Interface (API), which of the following are true: A) A server creates a socket, binds the socket to an address and port, and then listens for connections. Once an attempt to connect occurs, the server may optionally accept the connection. After accepting a connection, bi-directional communication is possible between the server and the connected client. B) A client creates a socket, binds the socket to an address and port, and then listens for connections. C) Sockets may use protocols other than Internet Protocol (IP). D) Sockets may use protocols other than Transmission Control Protocol (TCP). E) A server process may have no more than one connected socket at a time. Question 38 options: B and E Only A A, C, and D A, B, C, and D. B and D
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Question 39 Which of the following statements are true? A) Operating systems schedule process/thread access to I/O devices. B) Operating systems schedule process/thread run time on CPU cores. C) Operating systems schedule Internet packet arrival times. D) Operating systems may restrict processes/threads from accessing memory. Question 39 options: Only A A, B, and D A, B, C, and D A and B Question 40 Which of the following enable creation and modification of files on remote servers over a network? A) Network File System (NFS) - developed by Sun Microsystems in 1984 B) Server Message Block (SMB) – a.k.a. Common Internet File System (CIFS) developed by IBM and Microsoft 1990-1992 C) FAT D) FTP E) SCP F) RCP
G) WebDAV Question 40 options: All but G All but F All but C All but B Question 41 Which of the following are file systems? A) NTFS (New Technology File System) B) File Allocation Table (FAT) C) ZFS D) Extended file system (Ext) 4 Question 41 options: A and B A, C, and D A, B, and D A, B, C, and D