Home

In_________________ model, when a process does a release access, the contents of all the modifications are not immediately sent to other nodes but they are sent only on demand.

A. Release Consistency Model

B. Lazy Release consistency model

C. Weak Consistency Model

D. Processor Consistency Model

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. In MS-DOS, the interfaces and levels of functionality are _______________
  2. Wiretapping to capture data in a network is an example of ________________
  3. Creation of a semaphore set is done using the _______system call.
  4. Whenever you move a directory from one location to another
  5. What is dispatch latency?
  6. The command used to create logical drive for specific location of disk
  7. IPC stands for _________
  8. ____________ file system allows sharing in multiple different locations grouped under one folder.
  9. An option commonly takes the form of a _____followed by __________characters.
  10. A standard UNIX system includes a set of ___________ and a set of ___________.
  11. Bootstrapping is also known as ______
  12. Which one is true for unconditional disk formatting?
  13. ______________ is a situation in which two computer programs sharing the same resource are effectively…
  14. Which of the following operating system reads and reacts in actual time?
  15. A small part of taskbar that has icons of background running applications is
  16. In _______, if a processor writes the value 100 to the memory location x, this write operation will…
  17. Which components appear in the initial Windows start up display?
  18. The _________takes any characters from standard input, and then echoes them to standard output.
  19. In case of modification an unauthorized party not only gains access to but tampers with an asset. This…
  20. A _______________in a distributed system is a string of bits or characters that is used to refer to…
  21. All of the following are TRUE regarding virtual memory EXCEPT
  22. An orphan process is automatically inherited by the _____and becomes a _______ of this process.
  23. Recently deleted files are stored in
  24. A two-byte integer called ____________is interpreted as an index into an array of inodes in a fixed,…
  25. An operating system version designed for use with a media center PC is Microsoft Windows XP
  26. Pick the wrong statement from the following.
  27. Choose the correct statement from the following.
  28. Which of the following does not occur during the power-on-self-test (POST)?
  29. The find command is different from most UNIX commands in that each of the argument expressions following…
  30. The controller can access memory in memory cycles which are not used by the particular bank of memory…