What is the correct answer?


In ____________ location policies a random node is polled to check its state and the task is transferred if it will not be overloaded; polling is continued until a suitable node is found.

A. Threshold

B. Shortest

C. Bidding

D. Pairing

Correct Answer :

A. Threshold

Related Questions

When copying more than one file at a time, you must specify an existing… __ is the program run on a computer when the computer boots up Windows 2000 supports -------------- type of file system A page fault occurs when ____ runs on a computer hardware and serves as a platform for other system… Recently deleted files are stored in The two sub systems of user mode layer of windows 2000 are _________ and… Because the I/O devices are not synchronized with the CPU, some information… In the case of____________, message remains in the senders address space… Objects location is found by _________________ The Network Time Protocol is similar to _______________algorithm in that… A standard UNIX system includes a set of ___________ and a set of ___________. ______________ selects a process from among the ready processes to execute… An orphan process is automatically inherited by the _____and becomes a… __________ deals with when a modified page should be written out to secondary… RPN stands for Bootstrapping is also known as ______ You can move a window to a different position on your screen by dragging… Which one of the following statements is true? A bar that inform you the available options in your computer, opened applications,… All of the following are TRUE regarding virtual memory EXCEPT A program to be executed must be in --------------- The command used to create logical drive for specific location of disk ______________ is a situation in which two computer programs sharing the… You can use print manage window ______________is responsible for allocating primary memory to processes… Identify the distributed computing model from the following statement.… When a peripheral device needs immediate attention from the operating… One of the wonderful things about UNIX is its ___________names. ____________approach can place the data directly into the memory or take…