_____________ manage the name spaces and binds an object to its location.

A. Name Server

B. Name agent

C. Context

D. Name resolution

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. ______________is responsible for allocating primary memory to processes and for assisting the programmer…
  2. Which of the following is not essential to shut down your computer?
  3. The operating system is the most common type of ___ Software
  4. When resources have multiple instances ________ is used for deadlock Avoidance.
  5. The _____________ are based on modification of the original message in some manner, or on creation of…
  6. ______________ occurs when multiple processes or threads read and write data items so that the final…
  7. In the case of____________ , changes to an open file are only locally visible.
  8. The algorithm should be scalable i.e. _____________.
  9. The Network Time Protocol is similar to _______________algorithm in that synchronization is also performed…
  10. All of the following are TRUE regarding virtual memory EXCEPT
  11. The _________takes any characters from standard input, and then echoes them to standard output.
  12. A two-byte integer called ____________is interpreted as an index into an array of inodes in a fixed,…
  13. You can move a window to a different position on your screen by dragging it by its
  14. The primary purpose of an operating system is a …
  15. The ___ contains commands associated with the My Computer window
  16. Recently deleted files are stored in
  17. An operating system version designed for use with a media center PC is Microsoft Windows XP
  18. BSD stands for_____________________
  19. Taskbar is used for
  20. A sequence of instructions telling the computer what to do is called a_____________
  21. Which one is true for unconditional disk formatting?
  22. In case of good process migration mechanism, _____________ means failure of any node other than the…
  23. ______________approach simplifies debugging and system verification.
  24. A page fault occurs when
  25. A standard UNIX system includes a set of ___________ and a set of ___________.
  26. In_________________ model, when a process does a release access, the contents of all the modifications…
  27. _____________typically contains temporary data such as subroutine parameter, return address, and temporary…
  28. Underlined text, such as text and folder names is referred to as
  29. A SCSI device can transfer up to----------- of information per second.
  30. The early ARPAnet is an example of a distributed computing system based on the ________________.