Home

Find out the characteristics of System-oriented names:

A. They are large integers or bit strings.

B. They are of the same size

C. Generally shorter than human-oriented names and are easy for manipulations like hashing, sorting and so on.

D. All A, B, C

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. Pick the wrong statement from the following.
  2. A small part of taskbar that has icons of background running applications is
  3. A process control block contains varies attributes required by _____________ to control a process.
  4. Windows 2000 supports -------------- type of file system
  5. Having data belonging to two independent processes in the same page is called____________.
  6. A process is already split into pieces, called________________.
  7. In case of modification an unauthorized party not only gains access to but tampers with an asset. This…
  8. _______________occurs when two or more execution flows are able to run simultaneously.
  9. _______refers to the block size of the DSM system, i.e. to the units of sharing and the unit of data…
  10. PVM stands for
  11. What is Dr. Watson?
  12. Which one of the following statements is true?
  13. RPN stands for
  14. The command used to create logical drive for specific location of disk
  15. In the case of____________, message remains in the senders address space until the receiver executes…
  16. ______________ is a situation in which two computer programs sharing the same resource are effectively…
  17. An orphan process is automatically inherited by the _____and becomes a _______ of this process.
  18. Which of the following is/are external commands?
  19. The date and time displays on
  20. The primary purpose of an operating system is a …
  21. The Bankers algorithm is used
  22. In_________________ model, when a process does a release access, the contents of all the modifications…
  23. A program to be executed must be in ---------------
  24. A shared memory segment first needs to be allocated (create, using the__________ system call.
  25. In ____________ location policies a random node is polled to check its state and the task is transferred…
  26. In the case of____________ , changes to an open file are only locally visible.
  27. Process migration involves__________________
  28. Which of the following operating system reads and reacts in actual time?
  29. Which buffering strategy is used for implementing synchronous communication?
  30. You can move a window to a different position on your screen by dragging it by its