Home

What is the correct answer?

4

The ______________ unpacks the call receipt messages from local RPC Runtime and makes a perfect local call to invoke the appropriate procedure in the server.

A. server Stub

B. server

C. client

D. client stub

Correct Answer :

A. server Stub


Related Questions

What is the correct answer?

4

In the case of____________ , changes to an open file are only locally visible.

A. session semantics

B. immutable files

C. atomic transactions

D. None of the above.

What is the correct answer?

4

In _______, if a processor writes the value 100 to the memory location x, this write operation will only change the contents of its local memory and will not affect the contents of the memory of any other processor.

A. Tightly coupled systems,

B. Loosely coupled systems

C. Parallel processing systems

D. File management system

What is the correct answer?

4

In___________, the requesting device or devices assert the signal bus_request.

A. Priority encoded arbitration

B. Distributed arbitration by self-selection

C. Priority arbitration

D. Daisy chain arbitration

What is the correct answer?

4

You can move a window to a different position on your screen by dragging it by its

A. Tail

B. Move handle

C. Status bar

D. Title bar

What is the correct answer?

4

______________ is a situation in which two computer programs sharing the same resource are effectively preventing each other from accessing the resource, resulting in both programs ceasing to function.

A. Semaphore

B. Deadlock

C. Mutual Exclusion

D. No preemption

What is the correct answer?

4

A two-byte integer called ____________is interpreted as an index into an array of inodes in a fixed, known location on disk.

A. an inode

B. an inumber

C. an imap

D. an imark

What is the correct answer?

4

Two clocks are said to be synchronized at a particular instance of time if the difference in time values of the two clocks is less than some specified constant. The difference in time values of two clocks is called ___________.

A. Interrupt

B. Clock Frequency

C. Clock Ticks

D. Clock Skew

What is the correct answer?

4

The date and time displays on

A. Taskbar

B. Launch pad

C. Status bar

D. System tray

What is the correct answer?

4

Which components appear in the initial windows start up display?

A. Dialog box

B. Task bar

C. Start menu

D. All of the above

What is the correct answer?

4

_______________refers to a strategy where whenever a resource is requested, it is only granted if it cannot result in deadlock.

A. Deadlock Prevention

B. Livelock

C. Deadlock avoidance

D. none of these

What is the correct answer?

4

Recently deleted files are stored in

A. Taskbar

B. Desktop

C. My computer

D. Recycle bin

What is the correct answer?

4

What is dispatch latency?

A. The time taken by the dispatcher to stop one process and start another

B. The whole time taken by all processor

C. The time taken by the processor to write a file into disk

D. None of Above

What is the correct answer?

4

____________approach can place the data directly into the memory or take the data directly from the memory without direct intervention from the processor.

A. DMA

B. Daisy chain arbitration

C. polling

D. none of these

What is the correct answer?

4

A process is _________________

A. program in main memory

B. Program in cache memory

C. program in secondary storage

D. program in execution

What is the correct answer?

4

The essential difference between an operating system like Linux and one like Windows is that

A. Linux is a proprietary whereas Windows is not

B. Windows can run with an Intel processor, whereas Linux cannot

C. There are multiple versions of Linux, but only one version of Windows

D. Any programmer can modify Linux code which is not permitted with Windows

What is the correct answer?

4

_________, as a feature of good distributed file system, clients should be able to continue working if a file server crashes. Likewise, data must not be lost and a restarted file server must be able to recover to a valid state.

A. Scalability

B. Reliability

C. Flexibility

D. Fault tolerance

What is the correct answer?

4

In case of modification an unauthorized party not only gains access to but tampers with an asset. This is an attack on ____________________.

A. availability

B. confidentiality

C. integrity

D. authenticity

What is the correct answer?

4

Bootstrapping is also known as ______

A. cold-hot boot

B. hot boot

C. hot strap

D. cold boot

What is the correct answer?

4

A solution to starvation is _____________.

A. segmentation

B. Aging

C. Paging

D. virtual memory

What is the correct answer?

4

A page fault occurs when

A. the page is not found in the memory

B. the page is found in the memory

C. the Segmentation starts

D. the Deadlock happens

What is the correct answer?

4

The time taken by the Dispatcher to stop one process and start another running is known as _________________.

A. Turnaround time

B. Dispatch Latency

C. Access time

D. Response time

What is the correct answer?

4

Fsck conducts a check in _____ phases

A. One

B. Two

C. Five

D. Eight

What is the correct answer?

4

Creation of a semaphore set is done using the _______system call.

A. semget()

B. semsget()

C. mknod()

D. sempget()

What is the correct answer?

4

In case of ________________the server automatically copies files to other servers after the files are written.

A. Explicit replication

B. Implicit replication

C. Lazy file replication

D. Group file replication

What is the correct answer?

4

In MS-DOS, the interfaces and levels of functionality are _______________

A. not well separated.

B. well separated

C. independent

D. dependent

What is the correct answer?

4

______________ refers to the technology in which some space in hard disk is used as an extension of main memory.

A. Cache memory

B. Paging

C. Virtual memory

D. Associative memory

What is the correct answer?

4

______________approach simplifies debugging and system verification.

A. Kernel

B. Layered

C. Extended

D. Virtual machine

What is the correct answer?

4

The Network Time Protocol is similar to _______________algorithm in that synchronization is also performed using time servers and an attempt is made to correct for communication latencies.

A. Banker's

B. Divide and conquer's

C. Cristians

D. Xdelta's

What is the correct answer?

4

BSD stands for_____________________

A. Basic Software Division

B. Berkeley Software Distribution

C. British Software Distribution

D. Berkeley Software data

What is the correct answer?

4

The early ARPAnet is an example of a distributed computing system based on the ________________.

A. Minicomputer model

B. Workstation model

C. Hybrid model

D. Processor pool model