In ____________ location policies a random node is polled to check its state and the task is transferred if it will not be overloaded; polling is continued until a suitable node is found.

A. Threshold

B. Shortest

C. Bidding

D. Pairing

Related Questions

  1. ______________ refers to the technology in which some space in hard disk is used as an extension of…
  2. Choose the correct statement from the following.
  3. The maximum size of a write file is limited to only
  4. What is Dr. Watson?
  5. ____ runs on a computer hardware and serves as a platform for other system to run on
  6. A _______________in a distributed system is a string of bits or characters that is used to refer to…
  7. In Multics, a process could have up to 256K segments, but each segment was limited to ___________ 64K…
  8. Windows 2000 supports -------------- type of file system
  9. ______________ is a situation in which two computer programs sharing the same resource are effectively…
  10. Find out the characteristics of System-oriented names:
  11. The usual su command syntax is
  12. The command used to create logical drive for specific location of disk
  13. What do you mean by 0-reliable level in multicast communication?
  14. Which of the following is suitable after you install new drivers?
  15. Recently deleted files are stored in
  16. An operating system version designed for use with a media center PC is Microsoft Windows XP
  17. ______________is responsible for allocating primary memory to processes and for assisting the programmer…
  18. The Bankers algorithm is used
  19. One of the wonderful things about UNIX is its ___________names.
  20. A program to be executed must be in ---------------
  21. Which command is used to display the contents of the text file of DOS?
  22. ______________is a mechanism the prevents two or more processes from accessing a shared resource simultaneously.
  23. _____________typically contains temporary data such as subroutine parameter, return address, and temporary…
  24. Identify the distributed computing model from the following statement. In this model, the user's processes…
  25. A process is _________________
  26. Which one of the following statements is true?
  27. The _____________ are based on modification of the original message in some manner, or on creation of…
  28. Which is the layer of a computer system between the hardware and the user program
  29. A page fault occurs when
  30. In MS-DOS, the interfaces and levels of functionality are _______________

Please do not use chat terms. Example: avoid using "grt" instead of "great".