Deadlock Prevention
Livelock
Deadlock avoidance
none of these
C. Deadlock avoidance
Cleaning policy
Fetch policy
Frame locking
None
The directory is moved the source file is not moved
All the subdirectory inside that directory are moved
All files inside the directory are moved
Both b and c
Reverse Polish Notation
Record Police Notation
Record Polish Notation
Reverse Police Negation
The scandisk utility begins to run
The video card and video memory are tested
The BIOS identification process occurs
Memory chip are checked to ensure that they are working properly
Release Consistency Model
Lazy Release consistency model
Weak Consistency Model
Processor Consistency Model
Minicomputer model
Workstation model
Hybrid model
Processor pool model
Menu bar
Tool bar
Status bar
Task bar
Passive Time Server Centralized Algorithm
Active Time Server Centralized Algorithm
Global Averaging Distributed Algorithms
Localized Averaging Distributed Algorithms
Quick Response System
Time Sharing System
Batch Processing System
Real Time System
Livelock
Preemption
Semaphore
either or
interruption
interception
fabrication
modification
Banker's
Divide and conquer's
Cristians
Xdelta's
excel, executive
environment, integral
orbit , kernel
Kernel , executive
Unlimited path
Unlimited directory
Limited path
Limited file
Device setting
Run applications
All of above
Turn off the system
Existance of multuple computer visible and a provide a single system image to its users.
It runs the program transparently.
It is a technique to shift the program to other computer.
It is technique in which local procedures and remote procedures are indistinguishable to programmers.
Computer system
distributed system
network
None of the above
Race condition
Mutual exclusion
Exception
Interrupt
Basic Software Division
Berkeley Software Distribution
British Software Distribution
Berkeley Software data
Media center edition
Home edition
Tablet PC edition
None of above
Format
Fdisk
Subst
All of the above
semget()
semsget()
mknod()
sempget()
Operating system
Memory manager
Database administrator
RAM
They are large integers or bit strings.
They are of the same size
Generally shorter than human-oriented names and are easy for manipulations like hashing, sorting and so on.
All A, B, C
Cache memory
Paging
Virtual memory
Associative memory
availability
confidentiality
integrity
authenticity
To allow people to use the computer
To make the most efficient use of computer hardware
To make computer easier to use
To keep system programmer employed
DMA
Daisy chain arbitration
polling
none of these
action expression
Boolean expression.
Boolean constant
Search qualifiers
Broadcasting
Encoding Location of objects within UID
Searching creator node first and then broadcasting
All A, B, C