__________ deals with when a modified page should be written out to secondary memory.

A. Cleaning policy

B. Fetch policy

C. Frame locking

D. None

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. When copying more than one file at a time, you must specify an existing directory as the ___________
  2. Underlined text, such as text and folder names is referred to as
  3. The primary purpose of an operating system is a …
  4. A sequence of instructions telling the computer what to do is called a_____________
  5. An option commonly takes the form of a _____followed by __________characters.
  6. The algorithm should be scalable i.e. _____________.
  7. The _________takes any characters from standard input, and then echoes them to standard output.
  8. In case of ____________________transparency a file can transparently move to another server.
  9. What is dispatch latency?
  10. The primary purpose of an operating system is:
  11. The find command is different from most UNIX commands in that each of the argument expressions following…
  12. In ____________ location policies a random node is polled to check its state and the task is transferred…
  13. The ___ contains commands associated with the My Computer window
  14. When a peripheral device needs immediate attention from the operating system, it generates a(n)
  15. ______________ refers to the technology in which some space in hard disk is used as an extension of…
  16. IDL stands for_____________________
  17. The ______________ unpacks the call receipt messages from local RPC Runtime and makes a perfect local…
  18. To install the new font
  19. __________ deals with when a modified page should be written out to secondary memory.
  20. ______________ occurs when multiple processes or threads read and write data items so that the final…
  21. The Network Time Protocol is similar to _______________algorithm in that synchronization is also performed…
  22. _____________ manage the name spaces and binds an object to its location.
  23. Load balancing algorithms in ______________ class use the processor and process characteristics to allocate…
  24. What is Dr. Watson?
  25. A process is _________________
  26. Which components appear in the initial windows start up display?
  27. The Bankers algorithm is used
  28. An unauthorized party inserts counterfeit objects into the system is called_________________
  29. Objects location is found by _________________
  30. Find out the characteristics of System-oriented names: