Home
PDF Store
Exams
G.K.
Aptitude
Reasoning
English
Computer
Biology
Privacy
About
Contact
Home
All MCQ
Exams
PDF Store
G.K.
Aptitude
Reasoning
English
Computer
Biology
Privacy
About
Contact
Earn $100 Online Daily just answering survey. Click Here
What is the correct answer?
4
In layered approach each layer uses the functions and services of ------------------
A.
kernel
B.
lower-level layers
C.
higher-level layers
D.
all of these
Related Questions
Which command is used to display the contents of the text file of DOS?
Because the I/O devices are not synchronized with the CPU, some information…
Process migration involves__________________
You can move a window to a different position on your screen by dragging…
RPN stands for
The ______________ unpacks the call receipt messages from local RPC Runtime…
In_________________ model, when a process does a release access, the contents…
In Windows, start button is used to
The _____________ are based on modification of the original message in…
In ____________ location policies a random node is polled to check its…
______________approach simplifies debugging and system verification.
Which of the following does not occur during the power-on-self-test (POST)?
In the case of____________, message remains in the senders address space…
A _____________is a collection of processors that do not share memory,…
Which of the following is not essential to shut down your computer?
You can use print manage window
______________is a mechanism the prevents two or more processes from accessing…
What is dispatch latency?
_______________occurs when two or more execution flows are able to run…
When you start up the computer the boot up storage at which the BIOS versions…
Which is the layer of a computer system between the hardware and the user…
Initialization of I/O devices is part of the_________.
The time taken by the Dispatcher to stop one process and start another…
An orphan process is automatically inherited by the _____and becomes a…
Windows 2000 supports -------------- type of file system
_____________ manage the name spaces and binds an object to its location.
An unauthorized party inserts counterfeit objects into the system is called_________________
A bar that inform you the available options in your computer, opened applications,…
An operating system version designed for use with a media center PC is…
Find out the characteristics of System-oriented names:
Also checkout
Nervous System MCQ
Data Sufficiency MCQ
Biological Classification MCQ
Histology MCQ
General Biology Set 2 MCQ
IBPS Common Written Exam (PO/MT) Main 2016 Solved Paper MCQ
Synthesis of Sentences MCQ
Viruses MCQ
Airport Engineering MCQ
Coding MCQ
Phylum - Coelentrata MCQ
s-Block Element MCQ