main memory
secondary memory
virtual memory
Read only memory
A. main memory
The system should not enter a state in which nodes spend all their time migrating processes or exchanging control messages without doing any useful work.
The system should be able to handle small and large networked systems.
The algorithm should not be affected by the crash of one or more nodes in the system.
The process assignment decisions should be based on the current load of the system and not on some fixed static policy.
Single message buffer
Unbounded - Capacity buffer
Finite-Bound Buffer
All can be used.
To cancel the print job
To check status of files in the print queue
To interrupt printing
All of the above
interruption
interception
fabrication
modification
Threshold
Shortest
Bidding
Pairing
Banker's
Divide and conquer's
Cristians
Xdelta's
Hyperlink
Menu
Source drive
None of these
Integrated Data library
Isolated Data Library
Interface Data Language
Interface Definition Language
They are large integers or bit strings.
They are of the same size
Generally shorter than human-oriented names and are easy for manipulations like hashing, sorting and so on.
All A, B, C
Livelock
Preemption
Semaphore
either or
su-pwd
su-pd
su - userID
Sue- ID
cold-hot boot
hot boot
hot strap
cold boot
Interrupt
Clock Frequency
Clock Ticks
Clock Skew
semget()
msgrcv()
shmget()
mknod()
Location
Migration
Replication
Concurrency
Granularity
Coherence
Abstraction
Synchronization
IT Expert
Diagnosis tool
Surgeon
None
excel, executive
environment, integral
orbit , kernel
Kernel , executive
program in main memory
Program in cache memory
program in secondary storage
program in execution
To allow people to use the computer,
To make the most efficient use of the computer hardware
To make computers easier to use
To keep systems programmers employed
Quick Response System
Time Sharing System
Batch Processing System
Real Time System
Navigation program
Start a program
Switching between program
All of above
In computer terminology, variables are symbols which stand for some value.
An alternative method for executing the commands in the file backup is to make the file as directory.
The restricted shell gives more control to the system administrator and restricts the options of the user.
The decision making done by computer programs is in the form of conditional execution.
to prevent deadlock
to rectify deadlock
to detect deadlock
to slove deadlock
main memory
secondary memory
virtual memory
Read only memory
No buffering
Single message buffering
Unbounded-capacity buffer
Finite bound buffer
Reverse Polish Notation
Record Police Notation
Record Polish Notation
Reverse Police Negation
Cleaning policy
Fetch policy
Frame locking
None
Deadlock Prevention
Livelock
Deadlock avoidance
none of these
very costly
very slow
human errors
all of these