Once text has been cut to the clipboard, you can____hat text into another document

A. Copy

B. Paste

C. Transfer

D. None of the above

You can do it
  1. A _____________is a collection of processors that do not share memory, peripheral devices,or a clock.
  2. _______________refers to a strategy where whenever a resource is requested, it is only granted if it…
  3. A bar that inform you the available options in your computer, opened applications, background running…
  4. In case of ____________________transparency a file can transparently move to another server.
  5. The operating system is the most common type of ___ Software
  6. Creation of a semaphore set is done using the _______system call.
  7. Which one of the following statements is true?
  8. In Windows, start button is used to
  9. Fsck conducts a check in _____ phases
  10. When resources have multiple instances ________ is used for deadlock Avoidance.
  11. Choose the correct statement from the following.
  12. The two sub systems of user mode layer of windows 2000 are _________ and __________
  13. A standard UNIX system includes a set of ___________ and a set of ___________.
  14. Load balancing algorithms in ______________ class use the processor and process characteristics to allocate…
  15. The algorithm should be scalable i.e. _____________.
  16. IPC stands for _________
  17. In the case of____________, message remains in the senders address space until the receiver executes…
  18. The maximum size of a write file is limited to only
  19. In___________, the requesting device or devices assert the signal bus_request.
  20. ______________ are popular way to improve application through parallelism.
  21. _________, as a feature of good distributed file system, clients should be able to continue working…
  22. A _______________in a distributed system is a string of bits or characters that is used to refer to…
  23. An option commonly takes the form of a _____followed by __________characters.
  24. ___________variable is not automatically created on all UNIX systems but is used by so many programs…
  25. In case of modification an unauthorized party not only gains access to but tampers with an asset. This…
  26. Process migration involves__________________
  27. Which of the following does not occur during the power-on-self-test (POST)?
  28. Two clocks are said to be synchronized at a particular instance of time if the difference in time values…
  29. Having data belonging to two independent processes in the same page is called____________.
  30. BSD stands for_____________________