Home

An unauthorized party inserts counterfeit objects into the system is called_________________

A. interruption

B. interception

C. fabrication

D. modification

You can do it
  1. When a child dies, it sends a _______________signal to its parent.
  2. __________ deals with when a modified page should be written out to secondary memory.
  3. In ________________________ each node periodically sends a message to the time server.
  4. The problem with logical dumping is ________________
  5. Wiretapping to capture data in a network is an example of ________________
  6. In case of ________________the server automatically copies files to other servers after the files are…
  7. IDL stands for_____________________
  8. A SCSI device can transfer up to----------- of information per second.
  9. A sequence of instructions telling the computer what to do is called a_____________
  10. __ is the program run on a computer when the computer boots up
  11. The date and time displays on
  12. Once text has been cut to the clipboard, you can____hat text into another document
  13. Whenever you move a directory from one location to another
  14. Identify the server:This type of server generally remains in existence indefinitely. It is shared by…
  15. Which components appear in the initial Windows start up display?
  16. Transparent RPC mechanism refers to :
  17. Find out the characteristics of System-oriented names:
  18. The Basic Input Output System (BIOS) resides in
  19. Creation of a semaphore set is done using the _______system call.
  20. Which of the following is drop down list?
  21. A bar that inform you the available options in your computer, opened applications, background running…
  22. In layered approach each layer uses the functions and services of ------------------
  23. _______________refers to a strategy where whenever a resource is requested, it is only granted if it…
  24. Because the I/O devices are not synchronized with the CPU, some information must be exchanged between…
  25. RPN stands for
  26. A two-byte integer called ____________is interpreted as an index into an array of inodes in a fixed,…
  27. ______________is responsible for allocating primary memory to processes and for assisting the programmer…
  28. ____________ file system allows sharing in multiple different locations grouped under one folder.
  29. The time taken by the Dispatcher to stop one process and start another running is known as _________________.
  30. One of the wonderful things about UNIX is its ___________names.