Related Questions
What is the correct answer?
4
Which is the layer of a computer system between the hardware and the user program
What is the correct answer?
4
All of the following are TRUE regarding virtual memory EXCEPT
A. Any amount of RAM can be allocated to virtual memory
B. The setting for the amount of hard disk drive space to allocate virtual memory can be manually change
C. This temporary storage is called the swap file or page file
D. Virtual memory is the physical space o the hard drive
What is the correct answer?
4
In case of ____________________transparency a file can transparently move to another server.
What is the correct answer?
4
Wiretapping to capture data in a network is an example of ________________
What is the correct answer?
4
The Basic Input Output System (BIOS) resides in
What is the correct answer?
4
RPN stands for
A. Reverse Polish Notation
B. Record Police Notation
C. Record Polish Notation
D. Reverse Police Negation
What is the correct answer?
4
The controller can access memory in memory cycles which are not used by the particular bank of memory into which the DMA controller is writing data. This approach, called _________
What is the correct answer?
4
______________approach simplifies debugging and system verification.
What is the correct answer?
4
SRM stands for
A. Security Resource Manager
B. Secret Resource Manager
C. Security Reference Monitor
D. Security Reference Manual
What is the correct answer?
4
A _______________in a distributed system is a string of bits or characters that is used to refer to an entity.
What is the correct answer?
4
Creation of a semaphore set is done using the _______system call.
What is the correct answer?
4
___________variable is not automatically created on all UNIX systems but is used by so many programs that it is considered a standard environment variable.
What is the correct answer?
4
Having data belonging to two independent processes in the same page is called____________.
What is the correct answer?
4
Ext2 is the standard file system of _______ and uses a block size of_____bytes
What is the correct answer?
4
In MS-DOS, the interfaces and levels of functionality are _______________
What is the correct answer?
4
One of the wonderful things about UNIX is its ___________names.
What is the correct answer?
4
______________is responsible for allocating primary memory to processes and for assisting the programmer in loading and storing the contents of the primary memory.
C. Database administrator
What is the correct answer?
4
Which of the following is an essential file of a MS-DOS boot disk?
What is the correct answer?
4
A page fault occurs when
A. the page is not found in the memory
B. the page is found in the memory
C. the Segmentation starts
What is the correct answer?
4
A process is ____________________
A. A program in Execution.
B. An asynchronous activity.
C. The 'dispatchable' unit.
What is the correct answer?
4
IPC stands for _________
A. Integrated parallel communication
B. Intermediate process call
D. Inter process communication
What is the correct answer?
4
Recently deleted files are stored in
What is the correct answer?
4
Taskbar is used for
C. Switching between program
What is the correct answer?
4
In case of modification an unauthorized party not only gains access to but tampers with an asset. This is an attack on ____________________.
What is the correct answer?
4
Which buffering strategy is used for implementing synchronous communication?
B. Unbounded - Capacity buffer
What is the correct answer?
4
_________, as a feature of good distributed file system, clients should be able to continue working if a file server crashes. Likewise, data must not be lost and a restarted file server must be able to recover to a valid state.
What is the correct answer?
4
The essential difference between an operating system like Linux and one like Windows is that
A. Linux is a proprietary whereas Windows is not
B. Windows can run with an Intel processor, whereas Linux cannot
C. There are multiple versions of Linux, but only one version of Windows
D. Any programmer can modify Linux code which is not permitted with Windows
What is the correct answer?
4
The problem with logical dumping is ________________
What is the correct answer?
4
Load balancing algorithms in ______________ class use the processor and process characteristics to allocate processes to nodes.
What is the correct answer?
4
______________is a mechanism the prevents two or more processes from accessing a shared resource simultaneously.