DSM stands for______________

A. Direct shared memory

B. Direct system memory

C. Distributed shared memory

D. Distributed system memory

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. A bar that inform you the available options in your computer, opened applications, background running…
  2. Underlined text, such as text and folder names is referred to as
  3. The maximum size of a write file is limited to only
  4. The early ARPAnet is an example of a distributed computing system based on the ________________.
  5. You can move a window to a different position on your screen by dragging it by its
  6. Which of the following is an essential file of a MS-DOS boot disk?
  7. Transparent RPC mechanism refers to :
  8. In case of ____________________transparency a file can transparently move to another server.
  9. The two sub systems of user mode layer of windows 2000 are _________ and __________
  10. Recently deleted files are stored in
  11. ______________ is a situation in which two computer programs sharing the same resource are effectively…
  12. The Bankers algorithm is used
  13. When you start up the computer the boot up storage at which the BIOS versions manufacturer and data…
  14. The date and time displays on
  15. A small part of taskbar that has icons of background running applications is
  16. The primary purpose of an operating system is:
  17. Fsck conducts a check in _____ phases
  18. A _____________is a collection of processors that do not share memory, peripheral devices,or a clock.
  19. What is the function of radio button?
  20. Having data belonging to two independent processes in the same page is called____________.
  21. In _______, if a processor writes the value 100 to the memory location x, this write operation will…
  22. _____________typically contains temporary data such as subroutine parameter, return address, and temporary…
  23. When a child dies, it sends a _______________signal to its parent.
  24. _____________ manage the name spaces and binds an object to its location.
  25. In ____________ location policies a random node is polled to check its state and the task is transferred…
  26. Which buffering strategy is used for implementing synchronous communication?
  27. The problem with logical dumping is ________________
  28. ___________variable is not automatically created on all UNIX systems but is used by so many programs…
  29. A two-byte integer called ____________is interpreted as an index into an array of inodes in a fixed,…
  30. Bootstrapping is also known as ______