Related Questions
What is the correct answer?
4
___________variable is not automatically created on all UNIX systems but is used by so many programs that it is considered a standard environment variable.
What is the correct answer?
4
Two clocks are said to be synchronized at a particular instance of time if the difference in time values of the two clocks is less than some specified constant. The difference in time values of two clocks is called ___________.
What is the correct answer?
4
What do you mean by 0-reliable level in multicast communication?
A. Multiple responses is expected from any receivers.
B. No response is expected from any receivers.
C. Multiple responses is expected from multiple receivers.
D. A multicast message is received by all the members of the group or none.
What is the correct answer?
4
____ runs on a computer hardware and serves as a platform for other system to run on
What is the correct answer?
4
The Basic Input Output System (BIOS) resides in
What is the correct answer?
4
The algorithm should be scalable i.e. _____________.
A. The system should not enter a state in which nodes spend all their time migrating processes or exchanging control messages without doing any useful work.
B. The system should be able to handle small and large networked systems.
C. The algorithm should not be affected by the crash of one or more nodes in the system.
D. The process assignment decisions should be based on the current load of the system and not on some fixed static policy.
What is the correct answer?
4
One of the wonderful things about UNIX is its ___________names.
What is the correct answer?
4
The time taken by the Dispatcher to stop one process and start another running is known as _________________.
What is the correct answer?
4
______________ are popular way to improve application through parallelism.
What is the correct answer?
4
______________is responsible for allocating primary memory to processes and for assisting the programmer in loading and storing the contents of the primary memory.
C. Database administrator
What is the correct answer?
4
The controller can access memory in memory cycles which are not used by the particular bank of memory into which the DMA controller is writing data. This approach, called _________
What is the correct answer?
4
In MS-DOS, the interfaces and levels of functionality are _______________
What is the correct answer?
4
A process is ____________________
A. A program in Execution.
B. An asynchronous activity.
C. The 'dispatchable' unit.
What is the correct answer?
4
Which buffering strategy is used for implementing synchronous communication?
B. Unbounded - Capacity buffer
What is the correct answer?
4
A sequence of instructions telling the computer what to do is called a_____________
What is the correct answer?
4
A standard UNIX system includes a set of ___________ and a set of ___________.
B. Libraries, Applications
What is the correct answer?
4
______________ occurs when multiple processes or threads read and write data items so that the final result depends on the order of execution of instructions in the multiple processes.
What is the correct answer?
4
In case of ________________the server automatically copies files to other servers after the files are written.
D. Group file replication
What is the correct answer?
4
The Network Time Protocol is similar to _______________algorithm in that synchronization is also performed using time servers and an attempt is made to correct for communication latencies.
What is the correct answer?
4
In the case of____________, message remains in the senders address space until the receiver executes the corresponding receive.
B. Single message buffering
C. Unbounded-capacity buffer
What is the correct answer?
4
Which components appear in the initial windows start up display?
What is the correct answer?
4
A bar that inform you the available options in your computer, opened applications, background running applications and can be used to switch between applications quickly is
What is the correct answer?
4
Creation of a semaphore set is done using the _______system call.
What is the correct answer?
4
The usual su command syntax is
What is the correct answer?
4
The find command is different from most UNIX commands in that each of the argument expressions following the beginning path name is considered a _____________
What is the correct answer?
4
SRM stands for
A. Security Resource Manager
B. Secret Resource Manager
C. Security Reference Monitor
D. Security Reference Manual
What is the correct answer?
4
Fsck conducts a check in _____ phases
What is the correct answer?
4
A shared memory segment first needs to be allocated (create, using the__________ system call.
What is the correct answer?
4
What is dispatch latency?
A. The time taken by the dispatcher to stop one process and start another
B. The whole time taken by all processor
C. The time taken by the processor to write a file into disk
What is the correct answer?
4
The _____________ are based on modification of the original message in some manner, or on creation of a false message.
B. Release of message content attack
C. Traffic analysis attack