Load balancing algorithms in ______________ class use the processor and process characteristics to allocate processes to nodes.

A. Static

B. Dynamic

C. Deterministic

D. Probabilistic

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. A process control block contains varies attributes required by _____________ to control a process.
  2. An unauthorized party inserts counterfeit objects into the system is called_________________
  3. The name services of DCE include ________
  4. _______________occurs when two or more execution flows are able to run simultaneously.
  5. Which of the following is drop down list?
  6. A _____________is a collection of processors that do not share memory, peripheral devices,or a clock.
  7. In Windows, start button is used to
  8. SRM stands for
  9. The maximum size of a write file is limited to only
  10. IDL stands for_____________________
  11. Recently deleted files are stored in
  12. A program to be executed must be in ---------------
  13. One of the wonderful things about UNIX is its ___________names.
  14. Ext2 is the standard file system of _______ and uses a block size of_____bytes
  15. Which of the following does not occur during the power-on-self-test (POST)?
  16. A process is _________________
  17. In ________________________ each node periodically sends a message to the time server.
  18. You can move a window to a different position on your screen by dragging it by its
  19. Fsck conducts a check in _____ phases
  20. Which components appear in the initial Windows start up display?
  21. _____________typically contains temporary data such as subroutine parameter, return address, and temporary…
  22. The algorithm should be scalable i.e. _____________.
  23. Most accurate global time is based on oscillations of the ______________
  24. The problem with logical dumping is ________________
  25. A shared memory segment first needs to be allocated (create, using the__________ system call.
  26. A bar that inform you the available options in your computer, opened applications, background running…
  27. _______________refers to a strategy where whenever a resource is requested, it is only granted if it…
  28. __ is the program run on a computer when the computer boots up
  29. BSD stands for_____________________
  30. When you start up the computer the boot up storage at which the BIOS versions manufacturer and data…