____________approach can place the data directly into the memory or take the data directly from the memory without direct intervention from the processor.


B. Daisy chain arbitration

C. polling

D. none of these

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. A sequence of instructions telling the computer what to do is called a_____________
  2. In ________________________ each node periodically sends a message to the time server.
  3. An orphan process is automatically inherited by the _____and becomes a _______ of this process.
  4. Fsck conducts a check in _____ phases
  5. _______________refers to a strategy where whenever a resource is requested, it is only granted if it…
  6. Identify the server:This type of server generally remains in existence indefinitely. It is shared by…
  7. What is dispatch latency?
  8. Wiretapping to capture data in a network is an example of ________________
  9. A bar that inform you the available options in your computer, opened applications, background running…
  10. One of the wonderful things about UNIX is its ___________names.
  11. Having data belonging to two independent processes in the same page is called____________.
  12. In Windows, start button is used to
  13. Which of the following is an essential file of a MS-DOS boot disk?
  14. Which of the following does not occur during the power-on-self-test (POST)?
  15. Which of the following operating system reads and reacts in actual time?
  16. IPC stands for _________
  17. The algorithm should be scalable i.e. _____________.
  18. Whenever you move a directory from one location to another
  19. The ______________ unpacks the call receipt messages from local RPC Runtime and makes a perfect local…
  20. The Bankers algorithm is used
  21. Which of the following is/are external commands?
  22. Bootstrapping is also known as ______
  23. Which one is true for unconditional disk formatting?
  24. Pick the wrong statement from the following.
  25. A process is _________________
  26. The problem with logical dumping is ________________
  27. The controller can access memory in memory cycles which are not used by the particular bank of memory…
  28. ___________variable is not automatically created on all UNIX systems but is used by so many programs…
  29. In the case of____________, message remains in the senders address space until the receiver executes…
  30. In ____________ location policies a random node is polled to check its state and the task is transferred…