Related Questions
What is the correct answer?
4
The command used to create logical drive for specific location of disk
What is the correct answer?
4
The date and time displays on
What is the correct answer?
4
In _______, if a processor writes the value 100 to the memory location x, this write operation will only change the contents of its local memory and will not affect the contents of the memory of any other processor.
A. Tightly coupled systems,
B. Loosely coupled systems
C. Parallel processing systems
D. File management system
What is the correct answer?
4
Pick the wrong statement from the following.
A. UNIX systems originally came with a command interpreter called the Bourne Shell.
B. The cat command takes any characters from standard input, and then echoes them to standard output.
C. A pipe is a means of taking the output of one command and directing it as another command.
D. The manual entry is called a man page, even though it is often more than one page long.
What is the correct answer?
4
When resources have multiple instances ________ is used for deadlock Avoidance.
B. Resource Allocation Graph
What is the correct answer?
4
When a peripheral device needs immediate attention from the operating system, it generates a(n)
What is the correct answer?
4
Which of the following does not occur during the power-on-self-test (POST)?
A. The scandisk utility begins to run
B. The video card and video memory are tested
C. The BIOS identification process occurs
D. Memory chip are checked to ensure that they are working properly
What is the correct answer?
4
Which of the following is/are external commands?
What is the correct answer?
4
An operating system version designed for use with a media center PC is Microsoft Windows XP
What is the correct answer?
4
_______________occurs when two or more execution flows are able to run simultaneously.
What is the correct answer?
4
IPC stands for _________
A. Integrated parallel communication
B. Intermediate process call
D. Inter process communication
What is the correct answer?
4
In case of ________________the server automatically copies files to other servers after the files are written.
D. Group file replication
What is the correct answer?
4
Fsck conducts a check in _____ phases
What is the correct answer?
4
The time taken by the Dispatcher to stop one process and start another running is known as _________________.
What is the correct answer?
4
Once text has been cut to the clipboard, you can____hat text into another document
What is the correct answer?
4
______________ refers to the technology in which some space in hard disk is used as an extension of main memory.
What is the correct answer?
4
The ______________ unpacks the call receipt messages from local RPC Runtime and makes a perfect local call to invoke the appropriate procedure in the server.
What is the correct answer?
4
DSM stands for______________
C. Distributed shared memory
D. Distributed system memory
What is the correct answer?
4
A solution to starvation is _____________.
What is the correct answer?
4
A sequence of instructions telling the computer what to do is called a_____________
What is the correct answer?
4
Identify the distributed computing model from the following statement. In this model, the user's processes need not be migrated to the server machines for getting the work done by those machines.
C. Workstation-Server model
What is the correct answer?
4
In case of modification an unauthorized party not only gains access to but tampers with an asset. This is an attack on ____________________.
What is the correct answer?
4
In Multics, a process could have up to 256K segments, but each segment was limited to ___________ 64K words.
What is the correct answer?
4
In ________________________ each node periodically sends a message to the time server.
A. Passive Time Server Centralized Algorithm
B. Active Time Server Centralized Algorithm
C. Global Averaging Distributed Algorithms
D. Localized Averaging Distributed Algorithms
What is the correct answer?
4
A process is _________________
A. program in main memory
B. Program in cache memory
C. program in secondary storage
What is the correct answer?
4
_______refers to the block size of the DSM system, i.e. to the units of sharing and the unit of data transfer across the network when a network block fault occurs.
What is the correct answer?
4
__ is the program run on a computer when the computer boots up
What is the correct answer?
4
The problem with logical dumping is ________________
What is the correct answer?
4
Objects location is found by _________________
B. Encoding Location of objects within UID
C. Searching creator node first and then broadcasting
What is the correct answer?
4
An unauthorized party inserts counterfeit objects into the system is called_________________