Related Questions
What is the correct answer?
4
Which of the following does not occur during the power-on-self-test (POST)?
A. The scandisk utility begins to run
B. The video card and video memory are tested
C. The BIOS identification process occurs
D. Memory chip are checked to ensure that they are working properly
What is the correct answer?
4
_________, as a feature of good distributed file system, clients should be able to continue working if a file server crashes. Likewise, data must not be lost and a restarted file server must be able to recover to a valid state.
What is the correct answer?
4
The two sub systems of user mode layer of windows 2000 are _________ and __________
What is the correct answer?
4
Process migration involves__________________
A. Selection of a process to be migrated
B. Selection of destination system or node
C. Actual transfer of the selected process to the destination system or node
What is the correct answer?
4
All of the following are TRUE regarding virtual memory EXCEPT
A. Any amount of RAM can be allocated to virtual memory
B. The setting for the amount of hard disk drive space to allocate virtual memory can be manually change
C. This temporary storage is called the swap file or page file
D. Virtual memory is the physical space o the hard drive
What is the correct answer?
4
Underlined text, such as text and folder names is referred to as
What is the correct answer?
4
A two-byte integer called ____________is interpreted as an index into an array of inodes in a fixed, known location on disk.
What is the correct answer?
4
When you start up the computer the boot up storage at which the BIOS versions manufacturer and data are displayed on the monitor is called
C. Power on self test (POST)
What is the correct answer?
4
In ________________________ each node periodically sends a message to the time server.
A. Passive Time Server Centralized Algorithm
B. Active Time Server Centralized Algorithm
C. Global Averaging Distributed Algorithms
D. Localized Averaging Distributed Algorithms
What is the correct answer?
4
Windows 2000 supports -------------- type of file system
What is the correct answer?
4
In case of modification an unauthorized party not only gains access to but tampers with an asset. This is an attack on ____________________.
What is the correct answer?
4
A shared memory segment first needs to be allocated (create, using the__________ system call.
What is the correct answer?
4
____________approach can place the data directly into the memory or take the data directly from the memory without direct intervention from the processor.
B. Daisy chain arbitration
What is the correct answer?
4
RPN stands for
A. Reverse Polish Notation
B. Record Police Notation
C. Record Polish Notation
D. Reverse Police Negation
What is the correct answer?
4
In _______, if a processor writes the value 100 to the memory location x, this write operation will only change the contents of its local memory and will not affect the contents of the memory of any other processor.
A. Tightly coupled systems,
B. Loosely coupled systems
C. Parallel processing systems
D. File management system
What is the correct answer?
4
_____________typically contains temporary data such as subroutine parameter, return address, and temporary variables.
A. Current value of Program Counter
B. Value of the variables
What is the correct answer?
4
When a peripheral device needs immediate attention from the operating system, it generates a(n)
What is the correct answer?
4
In MS-DOS, the interfaces and levels of functionality are _______________
What is the correct answer?
4
The ___ contains commands associated with the My Computer window
What is the correct answer?
4
Bootstrapping is also known as ______
What is the correct answer?
4
In the case of____________, message remains in the senders address space until the receiver executes the corresponding receive.
B. Single message buffering
C. Unbounded-capacity buffer
What is the correct answer?
4
What is Dr. Watson?
What is the correct answer?
4
______________approach simplifies debugging and system verification.
What is the correct answer?
4
The maximum size of a write file is limited to only
C. The amount of memory in your computer
What is the correct answer?
4
The early ARPAnet is an example of a distributed computing system based on the ________________.
What is the correct answer?
4
The ______________ unpacks the call receipt messages from local RPC Runtime and makes a perfect local call to invoke the appropriate procedure in the server.
What is the correct answer?
4
A _____________is a collection of processors that do not share memory, peripheral devices,or a clock.
What is the correct answer?
4
The Bankers algorithm is used
What is the correct answer?
4
Which buffering strategy is used for implementing synchronous communication?
B. Unbounded - Capacity buffer
What is the correct answer?
4
______________ refers to the technology in which some space in hard disk is used as an extension of main memory.