CS324 Final Exam Review Fall 2025
Chapter 5: Input/Output
- Port Mapped I/O
- Memory Mapped I/O
- Access Types: sequential, direct, random
- Disk Organization
- Delay: seek, rotational, transfer
- Disk Scheduling Algorithms
Chapter 6: Deadlock
- Ostrich Algorithm
- Necessary Conditions
- Resource Allocation Graphs
- Prevention
- Avoidance
- Detection/Recovery
- Safe State
- Banker's Algorithm
Chapter 9: Security
- Access Matrix
- Access Lists
- Capability Lists
- Authentication
- Hashed Password
- Salt
- Symmetric Key Encryption
- Public Key Encryption
- Digital Signatures
Chapter 7: Virtualization
- Type 1 Hypervisor
- Type 2 Hypervisor