Cleaning policy
Fetch policy
Frame locking
None
A. Cleaning policy
Buffering
Blocking
Message-passing
False sharing
Page file
Spool
Stack
Interrupt
IT Expert
Diagnosis tool
Surgeon
None
NTFS
EFS
FEFS
EFFS
Threshold
Shortest
Bidding
Pairing
IFS
TERM
PATH
Source
Sub directory
Destination.
Path name
Name Server
Name agent
Context
Name resolution
40 Mbytes
60 Mbytes
40 Gbytes
60 Gbytes
Security Resource Manager
Secret Resource Manager
Security Reference Monitor
Security Reference Manual
Current value of Program Counter
Value of the variables
The process stack
A data section
availability
confidentiality
integrity
authenticity
Release Consistency Model
Lazy Release consistency model
Weak Consistency Model
Processor Consistency Model
Deadlock Prevention
Livelock
Deadlock avoidance
none of these
Existance of multuple computer visible and a provide a single system image to its users.
It runs the program transparently.
It is a technique to shift the program to other computer.
It is technique in which local procedures and remote procedures are indistinguishable to programmers.
The time taken by the dispatcher to stop one process and start another
The whole time taken by all processor
The time taken by the processor to write a file into disk
None of Above
Navigation program
Start a program
Switching between program
All of above
to prevent deadlock
to rectify deadlock
to detect deadlock
to slove deadlock
Edit
Label
Sys
All of above
Transfer system files after format
Do not check/scan surface after format
Destroys every byte of data on a disk by overwriting it with with blank spaces
All of above
Parallel Virtual Machine
Parallel Virtual Message
Process Virtual Machine
Process Virtual Monitor
UNIX systems originally came with a command interpreter called the Bourne Shell.
The cat command takes any characters from standard input, and then echoes them to standard output.
A pipe is a means of taking the output of one command and directing it as another command.
The manual entry is called a man page, even though it is often more than one page long.
Semaphore
Deadlock
Mutual Exclusion
No preemption
DMA
Daisy chain arbitration
polling
none of these
program in main memory
Program in cache memory
program in secondary storage
program in execution
semget()
msgrcv()
shmget()
mknod()
Explicit replication
Implicit replication
Lazy file replication
Group file replication
Operating system
Operating environment
System environment
None
To allow people to use the computer,
To make the most efficient use of the computer hardware
To make computers easier to use
To keep systems programmers employed
server Stub
server
client
client stub