A program in Execution.
An asynchronous activity.
The 'dispatchable' unit.
All A, B, C
D. All A, B, C
Existance of multuple computer visible and a provide a single system image to its users.
It runs the program transparently.
It is a technique to shift the program to other computer.
It is technique in which local procedures and remote procedures are indistinguishable to programmers.
init
fork
create
new
action expression
Boolean expression.
Boolean constant
Search qualifiers
Processes
Threads
Context switching
none of these
cold-hot boot
hot boot
hot strap
cold boot
Passive Time Server Centralized Algorithm
Active Time Server Centralized Algorithm
Global Averaging Distributed Algorithms
Localized Averaging Distributed Algorithms
Scalability
Reliability
Flexibility
Fault tolerance
Turnaround time
Dispatch Latency
Access time
Response time
kernel
lower-level layers
higher-level layers
all of these
Granularity
Coherence
Abstraction
Synchronization
To select multiple option
To select single option
To select all option
All of above
Hibernate
Sleep
Restart
Shut Down
Static
Dynamic
Deterministic
Probabilistic
Broadcasting
Encoding Location of objects within UID
Searching creator node first and then broadcasting
All A, B, C
Tail
Move handle
Status bar
Title bar
excel, executive
environment, integral
orbit , kernel
Kernel , executive
Security Resource Manager
Secret Resource Manager
Security Reference Monitor
Security Reference Manual
Start button
Quick launch
Task bar
System tray
Cesium-130 atom
Cesium-133 atom
Cesium-136 atom
Cesium-139 atom
Taskbar
Desktop
My computer
Recycle bin
Integrated parallel communication
Intermediate process call
Internal program call
Inter process communication
Basic Software Division
Berkeley Software Distribution
British Software Distribution
Berkeley Software data
Taskbar
Launch pad
Status bar
System tray
Linux is a proprietary whereas Windows is not
Windows can run with an Intel processor, whereas Linux cannot
There are multiple versions of Linux, but only one version of Windows
Any programmer can modify Linux code which is not permitted with Windows
Current value of Program Counter
Value of the variables
The process stack
A data section
Commands ,files
Libraries, Applications
Libraries, files
Files, Applications
Explicit replication
Implicit replication
Lazy file replication
Group file replication
Navigation program
Start a program
Switching between program
All of above
Passive attack
Release of message content attack
Traffic analysis attack
Active attack
Minicomputer model
Workstation model
Hybrid model
Processor pool model