Skip to main content

PROBLEM SOLVING AND PYTHON PROGRAMMING QUIZ

1) What is the first step in problem-solving? A) Writing code B) Debugging C) Understanding the problem D) Optimizing the solution Answer: C 2) Which of these is not a step in the problem-solving process? A) Algorithm development B) Problem analysis C) Random guessing D) Testing and debugging Answer: C 3) What is an algorithm? A) A high-level programming language B) A step-by-step procedure to solve a problem C) A flowchart D) A data structure Answer: B 4) Which of these is the simplest data structure for representing a sequence of elements? A) Dictionary B) List C) Set D) Tuple Answer: B 5) What does a flowchart represent? A) Errors in a program B) A graphical representation of an algorithm C) The final solution to a problem D) A set of Python modules Answer: B 6) What is pseudocode? A) Code written in Python B) Fake code written for fun C) An informal high-level description of an algorithm D) A tool for testing code Answer: C 7) Which of the following tools is NOT commonly used in pr...

Protection

Protection
* Files must be kept safe for accuracy (against accidental damage ), and protection ( against deliberate malicious access.) The former is usually controlled with backup copies. This section discusses the latter.
* One basic protection method is to remove all access to a file. However this makes the file not usable, so some sort of controlled access must be organized.

Types of Access
The following low-level operations are often controlled:
Read - See the contents of the file
Write - Edit the contents of the file.
Execute - Load the file onto the CPU and follow the instructions consists.
Append - Add to the end of an available file.
Delete - delete a file from the system.
List -View the name and different attributes of files on the system.
Higher-level operations, such as duplicate, can normally be performed through combinations of the above.

Access Control
* One method is to have hard Access Control Lists, ACL, which specify exactly what access is allowed or denied for specific users or groups.
• The AFS uses this system for distributed process.
• Control is very finely adjustable, but may be hard particularly when the 
specific users involved are unknown. ( AFS permits some wild cards, so for example all users on a certain remote system may be trusted, or a given username may be trusted when accessing from any remote system. )
* UNIX uses a set of 9 process control bits, in three groups of three. These correspond to R, W, and X allows for each of the Owner, Group, and Others. ( See "man chmod" for full details. ) The RWX bits control the following privileges for regular files and directories:
* Extra there are some special bits that can also be applied:
• The set user ID ( SUID ) bit and/or the set group ID ( SGID ) bits applied to  executable files temporarily change the identity of whoever runs the program to 
match that of the owner / group of the implementable program. This allows users running particular programs to have access to files ( while running that program ) to which they would normally be unable to access. Setting of these two bits is usually constricted to root, and must be done with caution, as it introduces a 
potential security leak.
• The sticky bit on a directory edits write permission, allowing users to only 
delete files for which they are the owner. This permits everyone to create files in 
/tmp, for example, but to only remove files which they have created, and not anyone else's.
• The SUID, SGID, and sticky bits are implies with an S, S, and T in the positions for execute permission for the user, group, and others, respectively. If the letter is lower case, ( s, s, t ), then the corresponding execute aquisition is not also given. If it is upper case, ( S, S, T ), then the corresponding execute aquisition IS given.
• The numeric form of chmod is required to set these advanced bits.
* Windows alters files access through a simple GUI:
Other Protection Approaches and Issues
* Some systems can apply passwords, either to individual files, or to particular sub-directories, or to the whole system. There is a trade-off between the number of passwords that must be maintained ( and remembered by the users ) and the amount of information that is endangered to a lost or forgotten password.
* Older systems which did not originally have multi-user file access permissions (DOS and older versions of Mac ) must now be furnished if they are to share files on a network.
* Access to a file requires aquire to all the files along its path as well. In a cyclic directory structure, users may have different acquire to the same file retrieved through different paths.
* Sometimes just the knowledge of the existent of a file of a certain name is a private concern. Hence the difference between the R and X bits on UNIX directories.

Popular posts from this blog

Introduction to C Programs

INTRODUCTION The programming language ‘C’ was developed by Dennis Ritchie in the early 1970s at Bell Laboratories. Although C was first developed for writing system software, today it has become such a famous language that a various of software programs are written using this language. The main advantage of using C for programming is that it can be easily used on different types of computers. Many other programming languages such as C++ and Java are also based on C which means that you will be able to learn them easily in the future. Today, C is mostly used with the UNIX operating system. Structure of a C program A C program contains one or more functions, where a function is defined as a group of statements that perform a well-defined task.The program defines the structure of a C program. The statements in a function are written in a logical series to perform a particular task. The most important function is the main() function and is a part of every C program. Rather, the execution o...

Performance

Performance ( Optional ) * The I/O system is a main factor in overall system performance, and can place heavy loads on other main components of the system ( interrupt handling, process switching, bus contention, memory access and CPU load for device drivers just to name a few. ) * Interrupt handling can be relatively costly ( slow ), which causes programmed I/O to be faster than interrupt driven I/O when the time spent busy waiting is not excessive. * Network traffic can also loads a heavy load on the system. Consider for example the sequence of events that occur when a single character is typed in a telnet session, as shown in figure( And the fact that a similar group of events must happen in reverse to echo back the character that was typed. ) Sun uses in-kernel threads for the telnet daemon, improving the supportable number of simultaneous telnet sessions from the hundreds to the thousands.   fig: Intercomputer communications. * Rather systems use front-end processor...

HEAT AND THERMODYNAMICS

Heat: * Temperature is the thermal state of the body, that chooses the direction of flow of heat.  * “Heat is a form of energy transfer between two systems or a system and its surroundings due to temperature difference between them.  Specific heat capacity  * Specific heat capacity of a substance is determined as the quantity of heat required to raise the temperature of 1 kg of the substance through 1K. Its unit is J kg^–1K^–1. * The specific heat capacity of water is the highest for any substance, 4180 J/kg K. It is 30 times the specific heat capacity  of mercury which is about 140J/kg K.  Specific Latent Heat  Specific Latent Heat of fusion of any substance is the quantity of heat energy needed to melt one kilogram of a substance without change in temperature. The symbol used is L. The unit for specific  latent heat is Joule/kilogram or J/kg  The Gas Laws  * Boyle’s Law  “Temperature remaining constant, the pressure of a given mass of ...