Granularity
Coherence
Abstraction
Synchronization
A. Granularity
Processes
Threads
Context switching
none of these
Source
Sub directory
Destination.
Path name
Tightly coupled systems,
Loosely coupled systems
Parallel processing systems
File management system
Format
Fdisk
Subst
All of the above
Scalability
Reliability
Flexibility
Fault tolerance
Broadcasting
Encoding Location of objects within UID
Searching creator node first and then broadcasting
All A, B, C
Start menu
Standard menu
System menu
None of the above
not well separated.
well separated
independent
dependent
Priority encoded arbitration
Distributed arbitration by self-selection
Priority arbitration
Daisy chain arbitration
Multiple responses is expected from any receivers.
No response is expected from any receivers.
Multiple responses is expected from multiple receivers.
A multicast message is received by all the members of the group or none.
Passive Time Server Centralized Algorithm
Active Time Server Centralized Algorithm
Global Averaging Distributed Algorithms
Localized Averaging Distributed Algorithms
Tasks
Program
Processors
Routines
Cleaning policy
Fetch policy
Frame locking
None
excel, executive
environment, integral
orbit , kernel
Kernel , executive
an inode
an inumber
an imap
an imark
cold-hot boot
hot boot
hot strap
cold boot
interruption
interception
fabrication
modification
In computer terminology, variables are symbols which stand for some value.
An alternative method for executing the commands in the file backup is to make the file as directory.
The restricted shell gives more control to the system administrator and restricts the options of the user.
The decision making done by computer programs is in the form of conditional execution.
IFS
TERM
PATH
Quick Response System
Time Sharing System
Batch Processing System
Real Time System
Copy
Paste
Transfer
None of the above
Deadlock
Concurrency
race condition
interrupt
Direct
distributed
sequential
parallel
Location
Migration
Replication
Concurrency
Start button
Quick launch
Task bar
System tray
Security Resource Manager
Secret Resource Manager
Security Reference Monitor
Security Reference Manual
The system should not enter a state in which nodes spend all their time migrating processes or exchanging control messages without doing any useful work.
The system should be able to handle small and large networked systems.
The algorithm should not be affected by the crash of one or more nodes in the system.
The process assignment decisions should be based on the current load of the system and not on some fixed static policy.
Semaphore
Deadlock
Mutual Exclusion
No preemption
su-pwd
su-pd
su - userID
Sue- ID
System software
Operating system
Application system
All of above