B. The access rights of a file in Unix is held in the file's inode, and is a combination of the protection bits, the user id, and the group id. There are ways to change each of these:
Some of you said that changing the setuid bit is another way, but that is a subset of chmod. If you didn't put chmod, then you got half credit (.3 points) for that answer. If you did put chmod, then you did not receive credit for mentioning the setuid bit.
C. Thrashing occurs when the combined size of the working sets of all resident programs is greater than the size of physical memory.
D. True: LRU is a ``stack'' algorithm, and does not exhibit Belady's anomaly.
E. False: public key encryption is based on the assumption that given those numbers d and n, it is very hard to discover e. Remember how d and e are defined: N is the product of two large primes p and q, and d and e are defined such that d*e mod (p-1)(q-1) equals one. So public key encryption is based on the fact that it is extremely hard to factor a product of two large primes.
You could have figured this out without worrying about the
mechanics of public-key encryption if you knew that the
running time of finding a greatest common denominator of
m and n is
O(log m) (where m is greater than n).
Grading
Two points per question. If you answered one of the true/falses wrong,
but then gave me a good definition that meant that you should have
gotten it correct, I gave you half credit.