Operativni SiSTEMi 1(Drugi Kolokvijum 2 Deo)

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Nikola
N
Nikola
Community Contributor
Quizzes Created: 3 | Total Attempts: 4,111
| Attempts: 882
SettingsSettings
Please wait...
  • 1/141 Pitanja

    Šta vidite na ovoj slici?

    • Dat prikaz kompletnog ulaza-izlaza. Na najnizem sloju su uredjaji. Sloj iznad uredjaja je takodje hardver-kontroleri. Prvi nivo sfotvera u kernelu zaduzen za ulaz-izlaz jesu device driveri. U visim slojevima kernela jeste ubrzavanje-kesiranje, baferisanje i rasporedjivanje. Kad je u pitanjuu ubrzavanje performansi, najjace je kesiranje
    • Option 2
    • Option 3
    • Option 4
Please wait...


Quiz Preview

  • 2. 

    Sta je IDS?

    • Intrusion Detection System

    • Inamic DLL sistem

    • Italy Design Studio

    • Ne znam

    Correct Answer
    A. Intrusion Detection System
    Explanation
    The correct answer is "Intrusion Detection System". An Intrusion Detection System (IDS) is a security technology that monitors network or system activities for malicious activities or policy violations. It analyzes network traffic and system logs to identify potential threats and alerts administrators to take appropriate actions to prevent unauthorized access or attacks. IDS helps in detecting and responding to security incidents, ensuring the integrity and availability of the network or system.

    Rate this question:

  • 3. 

    Proveri ovo da li je dobro?

    • A

    • B

    • C

    • D

    Correct Answer
    A. B
  • 4. 

    Šta je ovo?proveri da li je odgovor tacan

    • 1

    • 2

    • 3

    • 4

    Correct Answer
    A. 4
  • 5. 

     Šta je stateful, a šta stateless service?  

    • Stateful  service pamti sva svoja stanja, dok stateless ne pamti ništa-ne beleži ništa u svoje aktivne tabele.

    • Stateful service ne pamti nista, dok stateless pamti sve

    • Stateless pamti sve u tabele

    Correct Answer
    A. Stateful  service pamti sva svoja stanja, dok stateless ne pamti ništa-ne beleži ništa u svoje aktivne tabele.
    Explanation
    Stateful service is a type of service that remembers and stores its states, while stateless service does not remember or store anything in its active tables.

    Rate this question:

  • 6. 

    Šta vidite na ovoj slici?

    • Ovo je način funkcionisanja DMA, potrebno mu je dati adrese i broj bajtova. Prekid dobavlja PIC.

    • Ovo je način funkcionisanja RIM, potrebno mu je dati samo memoriju.

    • Ovo je način funkcionisanja DM, potrebno mu je dati broj bajtova

    • Ne znam

    Correct Answer
    A. Ovo je način funkcionisanja DMA, potrebno mu je dati adrese i broj bajtova. Prekid dobavlja PIC.
    Explanation
    The correct answer is "Ovo je način funkcionisanja DMA, potrebno mu je dati adrese i broj bajtova. Prekid dobavlja PIC." This is because the statement describes the functioning of DMA (Direct Memory Access), which requires addresses and the number of bytes to transfer data directly between devices and memory without involving the CPU. The interrupt is generated by the PIC (Programmable Interrupt Controller) to notify the CPU when the transfer is complete.

    Rate this question:

  • 7. 

    Kreiran je RAID 3 od cetiridiska. Odrediti storage efikasnost u % ok

    • 50%

    • 75%

    • 0%

    • 100%

    Correct Answer
    A. 75%
    Explanation
    The RAID 3 configuration with four disks has a storage efficiency of 75%. RAID 3 uses byte-level striping with dedicated parity, which means that each disk stores data and one disk is dedicated to storing parity information. In this configuration, 75% of the total disk space is available for storing data, while the remaining 25% is used for parity information. Therefore, the storage efficiency is 75%.

    Rate this question:

  • 8. 

    Koji je mehanizam napada ovde prisutan:

    • Trojan horse

    • Prepunjenje steaka (Buffer or  stack overflow)

    • Trap Door

    • Nista od navedenog

    Correct Answer
    A. Prepunjenje steaka (Buffer or  stack overflow)
    Explanation
    The correct answer is "Prepunjenje steaka (Buffer or stack overflow)". This mechanism of attack occurs when a program tries to write more data into a buffer than it can hold, causing it to overflow and overwrite adjacent memory locations. This can lead to the execution of malicious code or the manipulation of program behavior.

    Rate this question:

  • 9. 

    Koji je ovo RAID?

    • Raid 0

    • Raid 1+0

    • Raid 5

    • Raid 3

    • Raid 1

    Correct Answer
    A. Raid 1+0
    Explanation
    Raid 1+0, also known as Raid 10, is a type of RAID configuration that combines the benefits of both Raid 1 and Raid 0. It provides both data redundancy and improved performance. In Raid 1+0, data is mirrored across multiple drives (like Raid 1) and then these mirrored drives are striped together (like Raid 0). This means that if one drive fails, the mirrored drive will still have a copy of the data, ensuring data protection. Additionally, the striping of data across multiple drives improves read and write performance.

    Rate this question:

  • 10. 

    Šta vidite na ovoj slici?

    •   osnovnu matricu prava pristupa  

    • Protection domene, isključivo

    • Security domene, isključivo

    • Securitydomene, isključivo

    Correct Answer
    A.   osnovnu matricu prava pristupa  
    Explanation
    The correct answer is "osnovnu matricu prava pristupa" because it is the only option that is grammatically correct and makes sense in the given context. The other options are either incomplete or contain incorrect spelling or punctuation.

    Rate this question:

  • 11. 

    Šta je ovo? skup ključeva K skup poruka M skup autentifikatora A funkcija S:K -> (M->A) koja znači za svaki ključ K  iz skupa K S(k) je funkcija za generisanje autentifikatora iz poruke funkcija V:K->(MxA->true or false), koja znači za svaki ključ k iz skupa K, V(k) je funkcija za proveru autentifikatora za poruku 

    • Univerzalna kriptovanja

    • Enkripcija

    • Mrežna kriptografija

    • Autentifikacija (ilidigitalnopotpisivanje-digital signature)

    Correct Answer
    A. Autentifikacija (ilidigitalnopotpisivanje-digital signature)
    Explanation
    The given question describes a scenario where there is a set of keys K, a set of messages M, a set of authenticators A, a function S that generates an authenticator from a message using a key, and a function V that verifies the authenticity of a message using a key and an authenticator. Based on this information, the correct answer is "Autentifikacija (ilidigitalnopotpisivanje-digital signature)" which refers to the process of digitally signing a message to ensure its authenticity and integrity.

    Rate this question:

  • 12. 

    Koji je najmocniji mehanizam napada?

    • Trap door

    • Trojan Horse

    • Svi su jednako mocni

    • Prepunjenje steka i bafera

    Correct Answer
    A. Prepunjenje steka i bafera
    Explanation
    The correct answer is "Prepunjenje steka i bafera." This refers to a type of attack where an attacker overflows the memory buffer of a computer program, causing it to crash or allowing the attacker to execute malicious code. This type of attack can be used to gain unauthorized access to a system or to cause it to malfunction. It is considered one of the most powerful attack mechanisms because it can exploit vulnerabilities in a wide range of software applications and systems.

    Rate this question:

  • 13. 

    Šta vidite na ovoj slici?

    • Šema za ubrzavanje ulaza-izlaza. Nalaze se u memoriji

    • Šema za linkovanje uredjaja

    • Šema za procese

    • Ne znam

    Correct Answer
    A. Šema za ubrzavanje ulaza-izlaza. Nalaze se u memoriji
    Explanation
    The correct answer is "Schema for accelerating input-output. They are located in memory." This answer is correct because it accurately identifies the content of the image as a schema for accelerating input-output and states that it is located in memory. The other options (schema for linking devices and schema for processes) are not mentioned in the given information and are therefore incorrect. The option "I don't know" is also incorrect as it does not provide any information about the image.

    Rate this question:

  • 14. 

    Šta vidite na ovoj slici?

    • Na slici je predstavljen magnetni hard disk HDD

    • Na slici je predstavljen sektor HDD

    • Na slici je predstavljena rotacija HDD

    • Na slici je prikazan cilindar hard diska

    Correct Answer
    A. Na slici je predstavljen magnetni hard disk HDD
  • 15. 

    LOOK  algoritam za Disk Scheduling, sledeći zahtev za opsluživanje bira na osnovu

    • Najmanjeg rastojanja u odnosu na tekući cilindar, ali u smeru u kome je krenula glava

    • Najmanjeg rastojanja u odnosu na tekući cilindar, bez obzira na smer kretanja glave

    • Vremena ulaska u red čekanja

    Correct Answer
    A. Najmanjeg rastojanja u odnosu na tekući cilindar, ali u smeru u kome je krenula glava
    Explanation
    The correct answer is "najmanjeg rastojanja u odnosu na tekući cilindar, ali u smeru u kome je krenula glava." This means that the LOOK algorithm for Disk Scheduling selects the next request based on the smallest distance in relation to the current cylinder, but in the direction that the head is moving. This ensures that the head continues in the same direction and minimizes unnecessary movement, improving efficiency in disk access.

    Rate this question:

  • 16. 

    Šta vidite na ovoj slici?

    • Securitydomene,isključivo

    • Proširenu matricu prava pristupa  

    • Protectiondomene,isključivo

    • Osnovnu matricu prava pristupa

    Correct Answer
    A. Proširenu matricu prava pristupa  
  • 17. 

    Kreiran je RAID 0 od cetiri diska. Odrediti maksimalan stepen konkurencije za ovaj RAID (broj simultanih malih zahteva koji mogu da se obrade zajednicki)  

    • 3

    • 2

    • 4

    • 8

    Correct Answer
    A. 4
    Explanation
    The maximum degree of concurrency for this RAID 0 configuration with four disks is 4. RAID 0 distributes data across multiple disks, allowing for parallel read and write operations. In this case, all four disks can handle simultaneous small requests, resulting in a concurrency level of 4.

    Rate this question:

  • 18. 

    Za zapis R u baznoj datoteci pristiglo je 5 transakcija, od kojih su 3 read transakcije, a 2 write transakcije

    • Transakcije sigurno nisu u konfliktu

    • Transakcije su sigurno u konfliktu

    • Transakcije su možda u konfliktu, zavisi od Db serve

    •  Transakcije su možda u konfliktu, zavisi od vremena nailaska

    Correct Answer
    A. Transakcije su sigurno u konfliktu
    Explanation
    The given statement states that there are 3 read transactions and 2 write transactions in the base file. In a transaction, a read operation does not conflict with another read operation, and a write operation conflicts with both read and write operations. Since there are both read and write operations present, it is certain that the transactions are in conflict with each other.

    Rate this question:

  • 19. 

    Za zapis q u baznoj datoteci

    •  R=4

    • R=45

    • R=60

    • R=20

    Correct Answer
    A. R=60
    Explanation
    The given answer, R=60, is the correct answer because it is the last value mentioned in the given data. The data consists of multiple values of R, and the last value mentioned is R=60. Therefore, R=60 is the correct answer.

    Rate this question:

  • 20. 

    Da li proces iz domena D2 može preci u domen D3?

    • Može pod izvesnim uslovima

    • Ne

    • Da

    • Zavisi od OS

    Correct Answer
    A. Da
    Explanation
    The correct answer is "da" which means "yes" in English. This suggests that the process from domain D2 can indeed transition to domain D3.

    Rate this question:

  • 21. 

    Šta znaci kontrola?

    • Da po horizontali mozemo da menjamo ili podesavamo prava pristupa

    • Da po vertikali mozemo da menjamo prava pristupa

    • Da bocno mozemo da menjamo prava pristupa

    • Ne znam

    Correct Answer
    A. Da po horizontali mozemo da menjamo ili podesavamo prava pristupa
    Explanation
    The correct answer states that "Da po horizontali mozemo da menjamo ili podesavamo prava pristupa" which means "Yes, we can change or adjust access rights horizontally". This suggests that the control mentioned in the question refers to the ability to modify or adjust access rights in a horizontal manner.

    Rate this question:

  • 22. 

    Šta vidite na ovoj slici?

    • Klasifikacija UI uredjaja

    • Klasifikacija UL uredjaja

    • Klasifikacija MML uredjaja

    Correct Answer
    A. Klasifikacija UI uredjaja
    Explanation
    The correct answer is "Klasifikacija UI uredjaja" because the question is asking about what is seen in the picture, and the options provided are different classifications of devices. Among the options, "Klasifikacija UI uredjaja" is the only one that matches the question and indicates the classification of user interface devices.

    Rate this question:

  • 23. 

    Koja je ovo tehnika?

    • NAT

    • Proxy

    • DMZ

    •  Firewall  

    Correct Answer
    A.  Firewall  
    Explanation
    This question is asking for the name of a technique, and the correct answer is "Firewall." A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and an untrusted external network, such as the internet, to prevent unauthorized access and protect against malicious activities.

    Rate this question:

  • 24. 

    Da li proces iz domena D2 može preci u domen D3?

    • Ne

    • Da

    • Može pod izvesnim uslovima

    • Zavisi od OS

    Correct Answer
    A. Da
    Explanation
    The given correct answer is "Da" which means "Yes" in English. This suggests that the process from domain D2 can indeed transition to domain D3. However, without any further context or information about the domains D2 and D3, it is difficult to provide a more specific explanation.

    Rate this question:

  • 25. 

    C-LOOK  algoritam za Disk Scheduling, sledeći zahtev za opsluživanje bira na osnovu  

    • Vremena ulaska u red čekanja

    • Najmanjeg rastojanja u odnosu na tekuci cilindar, ali u smeru u kome je krenula glava

    • Najmanjeg rastojanja u odnosu na tekuci cilindar, bez obzira na smer kretanja glave

    Correct Answer
    A. Najmanjeg rastojanja u odnosu na tekuci cilindar, ali u smeru u kome je krenula glava
    Explanation
    The C-LOOK algorithm for Disk Scheduling selects the next request to be serviced based on the smallest distance in relation to the current cylinder, but in the direction the head is moving. This means that the algorithm prioritizes servicing requests that are in the same direction as the head's movement, reducing the amount of time it takes to service consecutive requests.

    Rate this question:

  • 26. 

    .Kreiran je RAID 5 od cetiri diska. Odrediti storage efikasnost u % ok

    • 75%

    • 50%

    • 100%

    • 0%

    Correct Answer
    A. 75%
    Explanation
    The storage efficiency in RAID 5 is 75%. RAID 5 uses block-level striping with distributed parity across all the drives in the array. This means that for every block of data, one drive in the array is dedicated to storing parity information. In a four-disk RAID 5 setup, three drives are used for data storage and one drive is used for parity. Therefore, the usable storage capacity is 75% of the total capacity of the four drives.

    Rate this question:

  • 27. 

    Koji je ovo Raid?

    • Raid 6

    • Raid 5

    • Raid 0

    • Raid 3

    • Raid 1

    Correct Answer
    A. Raid 6
    Explanation
    Raid 6 is the correct answer because it provides fault tolerance by using two parity blocks, allowing for the simultaneous loss of up to two drives without data loss. It offers higher data protection and reliability compared to Raid 5, which only uses one parity block. Raid 0 does not provide any fault tolerance, while Raid 3 and Raid 1 have different configurations and levels of fault tolerance.

    Rate this question:

  • 28. 

    Za zapis Q u baznoj datoteci:

    • W=60

    • W=45

    • W=10

    • . W=5

    Correct Answer
    A. W=45
    Explanation
    The correct answer is W=45 because it is the value assigned to the variable W in the given sequence of statements in the base file.

    Rate this question:

  • 29. 

    60. Za zapis R u baznoj datoteci pristiglo je 5 transakcija, od kojih su 4 read transakcije, a jedna write transakcija:

    • Transakcije su možda u konfliktu, zavisi od vremena nailaska

    • Transakcije sigurno nisu u konfliktu

    • Transakcije su možda u konfliktu, zavisi od Db server

    • Transakcije su sigurno u konfliktu

    Correct Answer
    A. Transakcije su sigurno u konfliktu
    Explanation
    The given answer states that the transactions are definitely in conflict. This means that there is a possibility of contention between the transactions due to the presence of both read and write operations. Conflict occurs when multiple transactions access and modify the same data simultaneously, leading to potential data inconsistencies or errors. Since there is at least one write transaction present, it is certain that there is a possibility of conflict with the read transactions.

    Rate this question:

  • 30. 

    Šta je ovo? Worms Viruses DOS

    • Kombinovane pretnje

    • Sistemske pretnje

    • Programske pretnje

    Correct Answer
    A. Sistemske pretnje
    Explanation
    This question is asking about a specific type of threat. The correct answer is "Sistemske pretnje," which translates to "System threats" in English. This suggests that the question is related to different types of threats that can affect a system. The other options, "Worms," "Viruses," and "DOS," are types of threats but do not specifically refer to system threats. Therefore, "Sistemske pretnje" is the most appropriate answer.

    Rate this question:

  • 31. 

    Glavni problem DFS su

    • Cache coherency

    •  administracija

    • Mrežne performance  

    • Security

    Correct Answer
    A. Cache coherency
    Explanation
    DFS stands for Depth-First Search, which is a graph traversal algorithm. The given answer "cache coherency" is a valid explanation for the main problem of DFS. Cache coherency refers to the consistency of data stored in different caches that are copies of the same data. In DFS, as the algorithm explores the graph by recursively visiting adjacent vertices, it may encounter the same vertex multiple times. This can lead to cache coherency issues, where different caches may have different copies of the same vertex's data, causing inconsistencies and incorrect results.

    Rate this question:

  • 32. 

    Da li proces iz domena D3 može postavljati prava pristupa za datoteku F1 u domenu D2?

    • Ne

    • Moze pod izvesnim uslovima

    • Da

    • Zavisi od OS

    Correct Answer
    A. Ne
    Explanation
    The process from domain D3 cannot set access rights for file F1 in domain D2.

    Rate this question:

  • 33. 

    Koji je ovo RAID?

    • RAID 6

    • RAID 5

    • RAID 4

    • RAID 3

    Correct Answer
    A. RAID 6
    Explanation
    RAID 6 is the correct answer because it is a type of Redundant Array of Independent Disks (RAID) that uses dual parity for data protection. It requires a minimum of four drives and can withstand the failure of two drives without losing data. This level of redundancy provides a higher level of fault tolerance and data protection compared to RAID 5, RAID 4, and RAID 3.

    Rate this question:

  • 34. 

    OS koji zadovolja sledede migracije: Migracija podataka (data migration), Migracija Izračunavanja (compute migration), Migracija procesa (process migration), naziva se:

    • Centralizovani OS

    • RealTime os

    • Network OS

    • Distribued OS

    Correct Answer
    A. Distribued OS
    Explanation
    A distributed OS is the correct answer because it satisfies the mentioned migrations: data migration, compute migration, and process migration. In a distributed OS, these migrations can be performed seamlessly across multiple machines or nodes in a network. The distributed nature of the OS allows for efficient sharing and utilization of resources, making it suitable for handling these types of migrations.

    Rate this question:

  • 35. 

     Šta vidite na ovoj slici. Nakon privremenog otkaza sistema, za svaku transakciju, za koju postoji Ti start, a ne postoji Ti commit, obavlja se:

    • Za sve transakcije

    • Samo za transakcije posle (iznad) checkpoint-a

    • Samo za trasakcije pre (ispod) checkpoint-a

    • Ne radi se ništa

    Correct Answer
    A. Samo za transakcije posle (iznad) checkpoint-a
    Explanation
    After a temporary system failure, the given answer states that for each transaction, which has a Ti start but no Ti commit, only transactions that occur after (above) the checkpoint will be processed. This means that any transactions that were initiated before the checkpoint will not be processed.

    Rate this question:

  • 36. 

    Da li proces iz domena D3 može postavljati prava pristupa za datoteku F1 u domenu D2?

    • A. Da

    • Ne

    • Može pod izvesnimuslovima

    • Zavisi od OS

    Correct Answer
    A. Ne
    Explanation
    No, the process from domain D3 cannot set access rights for file F1 in domain D2.

    Rate this question:

  • 37. 

    Da li proces iz domena D2 može postavljati prava pristupa za objekte u domenu D4?

    • Moze

    • Zavisi od OS

    • Da

    • Ne

    Correct Answer
    A. Ne
    Explanation
    The answer is "ne" because the process from domain D2 cannot set access rights for objects in domain D4.

    Rate this question:

  • 38. 

    Da li proces iz domena D1 može postavljati prava pristupa za objekte u domenu D2

    • DA

    • NE

    • Zavisi od OS

    • Moze pod izvesnim uslovima

    Correct Answer
    A. NE
    Explanation
    The given answer "NE" (NO) suggests that the process from domain D1 cannot set access rights for objects in domain D2. This implies that there is a restriction or limitation preventing the process from accessing or modifying the access rights of objects in a different domain.

    Rate this question:

  • 39. 

    Kreiran je RAID 5 od 3 diska. Odrediti storage efikasnost u %

    • 0%

    • 50%

    • 75%

    • 67%

    Correct Answer
    A. 67%
    Explanation
    RAID 5 is a data storage technique that distributes data and parity across multiple disks in a way that allows for data recovery in case of a single disk failure. In RAID 5, one disk's worth of storage is used for parity, which means that the storage efficiency is reduced by approximately 33%. Therefore, the storage efficiency in this case would be 67%.

    Rate this question:

  • 40. 

    13. Šta vidite na ovoj slici: Log-ovi su Koordinator Ci, zahteva od stanica da obave task-ove

    • Neophodni i kod koordinatora i kod sajtova

    • Poželnji su ali nisu neophodni samo kod koordinatora

    • Neophodni samo kod koordinatora

    • Neophodni samo kod sajtova

    Correct Answer
    A. Neophodni i kod koordinatora i kod sajtova
    Explanation
    The correct answer is that the logs are necessary both at the coordinator and at the sites. This means that the logs are required for both the coordinator and the sites to perform their tasks effectively.

    Rate this question:

  • 41. 

    Da bi ova šema funkcionisala:

    • Proesi se moraju poznavati između sebe, a moraju poznavati i koordinatora

    • Procesi se moraju poznavati između sebe, a ne moraju poznavati i koordinatora  

    • Procesi se ne moraju poznavati između sebe, a moraju poznavati i koordinatora

    • Procesi se moraju poznavati između sebe

    Correct Answer
    A. Procesi se ne moraju poznavati između sebe, a moraju poznavati i koordinatora
    Explanation
    To ensure that this system functions properly, the processes do not need to know each other, but they must know the coordinator. This means that the processes can operate independently without any direct communication or knowledge of each other, but they must have knowledge of the coordinator in order to coordinate their actions and ensure proper functioning of the system.

    Rate this question:

  • 42. 

    U šemi na slici

    • Proces P1 nece poslati reply procesu P2, ved koordinatoru

    • Proces P1 ce poslati reply procesu P2, kao i koordinatoru

    •  Proces P1 nece poslati reply procesu P2

    • Proces P1 ce poslati reply procesu P2

    Correct Answer
    A. Proces P1 ce poslati reply procesu P2
    Explanation
    The correct answer is "Proces P1 ce poslati reply procesu P2" because it states that Process P1 will send a reply to Process P2.

    Rate this question:

  • 43. 

    Da li proces iz domena D1može postavljati prava pristupa za objekte u domenu D2?

    • Zavisi od uslova

    • Ne

    • Da

    • Zavisi

    Correct Answer
    A. Ne
    Explanation
    The answer is "No" because a process from domain D1 cannot set access rights for objects in domain D2. The access rights for objects in a domain are typically managed by the security system of that domain, and processes from other domains do not have the authority to modify those access rights. Therefore, the process from D1 cannot set access rights for objects in D2.

    Rate this question:

  • 44. 

    Da li proces iz domena D2 može kopirati svoje execute pravo na datoteku F3 u domen D3?

    • .   može pod izvesnim uslovima  

    • Ne

    • Da

    • Zavisi od OS

    Correct Answer
    A. Ne
    Explanation
    The process from domain D2 cannot copy its execute permission to file F3 in domain D3.

    Rate this question:

  • 45. 

    .Kreiran je RAID 6 od cetiridiska. Odrediti storage efikasnost u % ok

    • 50%

    • 75%

    • 0%

    • 100%

    Correct Answer
    A. 75%
    Explanation
    The correct answer is 75%. RAID 6 is a redundant array of independent disks that uses two parity blocks to provide fault tolerance. In this case, with four disks, two disks are used for parity, leaving two disks for data storage. Therefore, the storage efficiency is calculated by dividing the total data storage capacity (2 disks) by the total capacity (4 disks), which equals 0.5 or 50%. However, since RAID 6 can withstand the failure of two disks, the usable storage capacity is actually 75% of the total capacity, making the correct answer 75%.

    Rate this question:

  • 46. 

    Šta vidite na ovoj slici? Log-ovi su?

    • Neophodni i kod koordinatora i kod sajtova

    •  poželnji su ali nisu neophodni samo kod koordinatora

    • Neophodni samo kod koordinatora

    • D. neophodni samo kod sajtova

    Correct Answer
    A. Neophodni i kod koordinatora i kod sajtova
    Explanation
    The correct answer states that logs are necessary both for coordinators and websites. This implies that logs serve a crucial purpose for both coordinators and websites, indicating that they are essential for both.

    Rate this question:

  • 47. 

    Kreiran je RAID 0 od cetiri diska. Oceniti ovaj RAID po pitanju RR (random read performansi), RW(random write performansi), SR (sekvencijalne read performanse) I SW (sekvencijalne write performanse) sa sledecim ocenama: odlican ocena 5 ,srednjedobar-ocena3, jako slab ocena 1

    •  RR3 RW3 SR3 SW3

    • RR5 RW5 SR5 SW5

    • RR3 RW1 SR3 SW3

    Correct Answer
    A. RR5 RW5 SR5 SW5
    Explanation
    The given answer indicates that the RAID 0 configuration with four disks has excellent performance in terms of random read (RR), random write (RW), sequential read (SR), and sequential write (SW). This is represented by the highest rating of 5 for each performance metric.

    Rate this question:

  • 48. 

    Pristup udaljenoj datoteci na DS je mogud kao:

    • Može i kao cache access i kao remote service

    •  isključivo cache access

    • Isključivo remote service

    • Isključivo socket access

    Correct Answer
    A. Može i kao cache access i kao remote service
    Explanation
    The correct answer is "može i kao cache access i kao remote service". This means that accessing a remote file on a DS can be done both as cache access and as a remote service. This suggests that there are multiple ways to access the remote file, either by using a cached version or by accessing it directly through a remote service.

    Rate this question:

  • 49. 

    . Šta vidite na ovoj slici. Nakon privremenog otkaza sistema, za svaku transakciju, za koju postoji Ti start, a ne postoji Ti commit, obavlja se:

    • Obavlja se undo(Ti)

    • Obavlja se redo(Ti)

    • Restartuje se

    • Ne radi se ništa

    Correct Answer
    A. Obavlja se undo(Ti)
    Explanation
    In the given scenario, after a temporary system failure, if there is a transaction Ti that has a start but no commit, the system performs an undo(Ti) operation. This means that any changes made by the transaction Ti are reversed or rolled back to maintain data consistency and integrity. This ensures that the incomplete transaction does not have any lasting effects on the system.

    Rate this question:

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • May 26, 2019
    Quiz Created by
    Nikola
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.