Related Questions
What is the correct answer?
4
______________approach simplifies debugging and system verification.
What is the correct answer?
4
When a peripheral device needs immediate attention from the operating system, it generates a(n)
What is the correct answer?
4
The time taken by the Dispatcher to stop one process and start another running is known as _________________.
What is the correct answer?
4
What is Dr. Watson?
What is the correct answer?
4
In MS-DOS, the interfaces and levels of functionality are _______________
What is the correct answer?
4
IDL stands for_____________________
A. Integrated Data library
C. Interface Data Language
D. Interface Definition Language
What is the correct answer?
4
In ____________ location policies a random node is polled to check its state and the task is transferred if it will not be overloaded; polling is continued until a suitable node is found.
What is the correct answer?
4
____________approach can place the data directly into the memory or take the data directly from the memory without direct intervention from the processor.
B. Daisy chain arbitration
What is the correct answer?
4
A standard UNIX system includes a set of ___________ and a set of ___________.
B. Libraries, Applications
What is the correct answer?
4
The problem with logical dumping is ________________
What is the correct answer?
4
_____________ manage the name spaces and binds an object to its location.
What is the correct answer?
4
A solution to starvation is _____________.
What is the correct answer?
4
An option commonly takes the form of a _____followed by __________characters.
What is the correct answer?
4
Identify the server:
This type of server generally remains in existence indefinitely. It is shared by many clients. Servers of this type are created and installed before the clients use them.
A. Instance-per-call-servers
C. Non-Persistent Servers
What is the correct answer?
4
When a child dies, it sends a _______________signal to its parent.
What is the correct answer?
4
Load balancing algorithms in ______________ class use the processor and process characteristics to allocate processes to nodes.
What is the correct answer?
4
In case of ____________________transparency a file can transparently move to another server.
What is the correct answer?
4
The _____________ are based on modification of the original message in some manner, or on creation of a false message.
B. Release of message content attack
C. Traffic analysis attack
What is the correct answer?
4
The usual su command syntax is
What is the correct answer?
4
Whenever you move a directory from one location to another
A. The directory is moved the source file is not moved
B. All the subdirectory inside that directory are moved
C. All files inside the directory are moved
What is the correct answer?
4
______________is responsible for allocating primary memory to processes and for assisting the programmer in loading and storing the contents of the primary memory.
C. Database administrator
What is the correct answer?
4
The _________takes any characters from standard input, and then echoes them to standard output.
What is the correct answer?
4
A sequence of instructions telling the computer what to do is called a_____________
What is the correct answer?
4
The Basic Input Output System (BIOS) resides in
What is the correct answer?
4
In case of modification an unauthorized party not only gains access to but tampers with an asset. This is an attack on ____________________.
What is the correct answer?
4
The ______________ unpacks the call receipt messages from local RPC Runtime and makes a perfect local call to invoke the appropriate procedure in the server.
What is the correct answer?
4
The maximum size of a write file is limited to only
C. The amount of memory in your computer
What is the correct answer?
4
Most accurate global time is based on oscillations of the ______________
What is the correct answer?
4
The Network Time Protocol is similar to _______________algorithm in that synchronization is also performed using time servers and an attempt is made to correct for communication latencies.
What is the correct answer?
4
Underlined text, such as text and folder names is referred to as