SRM stands for

A. Security Resource Manager

B. Secret Resource Manager

C. Security Reference Monitor

D. Security Reference Manual

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. In case of ____________________transparency a file can transparently move to another server.
  2. The two sub systems of user mode layer of windows 2000 are _________ and __________
  3. In MS-DOS, the interfaces and levels of functionality are _______________
  4. Which buffering strategy is used for implementing synchronous communication?
  5. Windows 2000 supports -------------- type of file system
  6. _____________ manage the name spaces and binds an object to its location.
  7. A process control block contains varies attributes required by _____________ to control a process.
  8. You can use print manage window
  9. BSD stands for_____________________
  10. In layered approach each layer uses the functions and services of ------------------
  11. Which of the following does not occur during the power-on-self-test (POST)?
  12. The date and time displays on
  13. IDL stands for_____________________
  14. An orphan process is automatically inherited by the _____and becomes a _______ of this process.
  15. Which of the following is an essential file of a MS-DOS boot disk?
  16. _______________refers to a strategy where whenever a resource is requested, it is only granted if it…
  17. Two clocks are said to be synchronized at a particular instance of time if the difference in time values…
  18. A process is already split into pieces, called________________.
  19. Which of the following is suitable after you install new drivers?
  20. __________ deals with when a modified page should be written out to secondary memory.
  21. The controller can access memory in memory cycles which are not used by the particular bank of memory…
  22. ______________is responsible for allocating primary memory to processes and for assisting the programmer…
  23. Which of the following is drop down list?
  24. An option commonly takes the form of a _____followed by __________characters.
  25. The _________takes any characters from standard input, and then echoes them to standard output.
  26. Objects location is found by _________________
  27. In_________________ model, when a process does a release access, the contents of all the modifications…
  28. One of the wonderful things about UNIX is its ___________names.
  29. A small part of taskbar that has icons of background running applications is
  30. The problem with logical dumping is ________________