Related Questions
What is the correct answer?
4
An orphan process is automatically inherited by the _____and becomes a _______ of this process.
A. 'init' process, father
C. 'initial process, father
What is the correct answer?
4
Load balancing algorithms in ______________ class use the processor and process characteristics to allocate processes to nodes.
What is the correct answer?
4
A sequence of instructions telling the computer what to do is called a_____________
What is the correct answer?
4
____________approach can place the data directly into the memory or take the data directly from the memory without direct intervention from the processor.
B. Daisy chain arbitration
What is the correct answer?
4
____________ file system allows sharing in multiple different locations grouped under one folder.
What is the correct answer?
4
______________approach simplifies debugging and system verification.
What is the correct answer?
4
_______________refers to a strategy where whenever a resource is requested, it is only granted if it cannot result in deadlock.
What is the correct answer?
4
Which of the following operating system reads and reacts in actual time?
C. Batch Processing System
What is the correct answer?
4
A program to be executed must be in ---------------
What is the correct answer?
4
In the case of____________ , changes to an open file are only locally visible.
What is the correct answer?
4
Transparent RPC mechanism refers to :
A. Existance of multuple computer visible and a provide a single system image to its users.
B. It runs the program transparently.
C. It is a technique to shift the program to other computer.
D. It is technique in which local procedures and remote procedures are indistinguishable to programmers.
What is the correct answer?
4
______________is responsible for allocating primary memory to processes and for assisting the programmer in loading and storing the contents of the primary memory.
C. Database administrator
What is the correct answer?
4
Windows 2000 supports -------------- type of file system
What is the correct answer?
4
In the case of____________, message remains in the senders address space until the receiver executes the corresponding receive.
B. Single message buffering
C. Unbounded-capacity buffer
What is the correct answer?
4
Identify the distributed computing model from the following statement. In this model, the user's processes need not be migrated to the server machines for getting the work done by those machines.
C. Workstation-Server model
What is the correct answer?
4
Which of the following is suitable after you install new drivers?
What is the correct answer?
4
Pick the wrong statement from the following.
A. UNIX systems originally came with a command interpreter called the Bourne Shell.
B. The cat command takes any characters from standard input, and then echoes them to standard output.
C. A pipe is a means of taking the output of one command and directing it as another command.
D. The manual entry is called a man page, even though it is often more than one page long.
What is the correct answer?
4
A SCSI device can transfer up to----------- of information per second.
What is the correct answer?
4
_______refers to the block size of the DSM system, i.e. to the units of sharing and the unit of data transfer across the network when a network block fault occurs.
What is the correct answer?
4
The ___ contains commands associated with the My Computer window
What is the correct answer?
4
In case of modification an unauthorized party not only gains access to but tampers with an asset. This is an attack on ____________________.
What is the correct answer?
4
Fsck conducts a check in _____ phases
What is the correct answer?
4
______________ are popular way to improve application through parallelism.
What is the correct answer?
4
__________ deals with when a modified page should be written out to secondary memory.
What is the correct answer?
4
______________ refers to the technology in which some space in hard disk is used as an extension of main memory.
What is the correct answer?
4
A process is already split into pieces, called________________.
What is the correct answer?
4
_________, as a feature of good distributed file system, clients should be able to continue working if a file server crashes. Likewise, data must not be lost and a restarted file server must be able to recover to a valid state.
What is the correct answer?
4
A _______________in a distributed system is a string of bits or characters that is used to refer to an entity.
What is the correct answer?
4
Initialization of I/O devices is part of the_________.
What is the correct answer?
4
Objects location is found by _________________
B. Encoding Location of objects within UID
C. Searching creator node first and then broadcasting