Q1. The working set theory of programming behavior of processes running within an operating system
involves:
a) The collection of pages that a process accesses
b) Disk scheduling mechanisms
c) Coalescing holes in memory
d) Assigning the CPU to processes
e) None of The Above
Q2. Trojan Horse programs:
a) Are legitimate programs that allow unauthorized access
b) Do not usually work
c) Are hidden programs that do not show up on the system
d) Usually are immediately discovered
e) None of The Above
Q3. Page Stealing:
a) is a sign of an efficient system
b)...