Related Questions
What is the correct answer?
4
The _____________ are based on modification of the original message in some manner, or on creation of a false message.
B. Release of message content attack
C. Traffic analysis attack
What is the correct answer?
4
Recently deleted files are stored in
What is the correct answer?
4
Wiretapping to capture data in a network is an example of ________________
What is the correct answer?
4
One of the wonderful things about UNIX is its ___________names.
What is the correct answer?
4
___________variable is not automatically created on all UNIX systems but is used by so many programs that it is considered a standard environment variable.
What is the correct answer?
4
In___________, the requesting device or devices assert the signal bus_request.
A. Priority encoded arbitration
B. Distributed arbitration by self-selection
D. Daisy chain arbitration
What is the correct answer?
4
The Network Time Protocol is similar to _______________algorithm in that synchronization is also performed using time servers and an attempt is made to correct for communication latencies.
What is the correct answer?
4
Process migration involves__________________
A. Selection of a process to be migrated
B. Selection of destination system or node
C. Actual transfer of the selected process to the destination system or node
What is the correct answer?
4
In MS-DOS, the interfaces and levels of functionality are _______________
What is the correct answer?
4
____________approach can place the data directly into the memory or take the data directly from the memory without direct intervention from the processor.
B. Daisy chain arbitration
What is the correct answer?
4
A page fault occurs when
A. the page is not found in the memory
B. the page is found in the memory
C. the Segmentation starts
What is the correct answer?
4
In_________________ model, when a process does a release access, the contents of all the modifications are not immediately sent to other nodes but they are sent only on demand.
A. Release Consistency Model
B. Lazy Release consistency model
C. Weak Consistency Model
D. Processor Consistency Model
What is the correct answer?
4
The usual su command syntax is
What is the correct answer?
4
In case of ________________the server automatically copies files to other servers after the files are written.
D. Group file replication
What is the correct answer?
4
In the case of____________ , changes to an open file are only locally visible.
What is the correct answer?
4
In layered approach each layer uses the functions and services of ------------------
What is the correct answer?
4
In case of modification an unauthorized party not only gains access to but tampers with an asset. This is an attack on ____________________.
What is the correct answer?
4
_______refers to the block size of the DSM system, i.e. to the units of sharing and the unit of data transfer across the network when a network block fault occurs.
What is the correct answer?
4
Which of the following is suitable after you install new drivers?
What is the correct answer?
4
An operating system version designed for use with a media center PC is Microsoft Windows XP
What is the correct answer?
4
______________ occurs when multiple processes or threads read and write data items so that the final result depends on the order of execution of instructions in the multiple processes.
What is the correct answer?
4
A _______________in a distributed system is a string of bits or characters that is used to refer to an entity.
What is the correct answer?
4
The controller can access memory in memory cycles which are not used by the particular bank of memory into which the DMA controller is writing data. This approach, called _________
What is the correct answer?
4
Which components appear in the initial Windows start up display?
What is the correct answer?
4
In Multics, a process could have up to 256K segments, but each segment was limited to ___________ 64K words.
What is the correct answer?
4
A two-byte integer called ____________is interpreted as an index into an array of inodes in a fixed, known location on disk.
What is the correct answer?
4
______________approach simplifies debugging and system verification.
What is the correct answer?
4
A standard UNIX system includes a set of ___________ and a set of ___________.
B. Libraries, Applications
What is the correct answer?
4
A _____________is a collection of processors that do not share memory, peripheral devices,or a clock.
What is the correct answer?
4
An orphan process is automatically inherited by the _____and becomes a _______ of this process.
A. 'init' process, father
C. 'initial process, father