__ is the program run on a computer when the computer boots up

A. System software

B. Operating system

C. System operations

D. None

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. Which buffering strategy is used for implementing synchronous communication?
  2. In ____________ location policies a random node is polled to check its state and the task is transferred…
  3. Which one of the following statements is true?
  4. ______________ is a situation in which two computer programs sharing the same resource are effectively…
  5. _____________typically contains temporary data such as subroutine parameter, return address, and temporary…
  6. Identify the distributed computing model from the following statement. In this model, the user's processes…
  7. The maximum size of a write file is limited to only
  8. All of the following are TRUE regarding virtual memory EXCEPT
  9. Choose the correct statement from the following.
  10. Identify the server:This type of server generally remains in existence indefinitely. It is shared by…
  11. The _____________ are based on modification of the original message in some manner, or on creation of…
  12. __ is the program run on a computer when the computer boots up
  13. The primary purpose of an operating system is a …
  14. ___________variable is not automatically created on all UNIX systems but is used by so many programs…
  15. Fsck conducts a check in _____ phases
  16. The find command is different from most UNIX commands in that each of the argument expressions following…
  17. Which one is true for unconditional disk formatting?
  18. In _______, if a processor writes the value 100 to the memory location x, this write operation will…
  19. Having data belonging to two independent processes in the same page is called____________.
  20. Windows 2000 supports -------------- type of file system
  21. Once text has been cut to the clipboard, you can____hat text into another document
  22. Objects location is found by _________________
  23. The Bankers algorithm is used
  24. What is Dr. Watson?
  25. _______________refers to a strategy where whenever a resource is requested, it is only granted if it…
  26. An option commonly takes the form of a _____followed by __________characters.
  27. IDL stands for_____________________
  28. Creation of a semaphore set is done using the _______system call.
  29. Transparent RPC mechanism refers to :
  30. A SCSI device can transfer up to----------- of information per second.