Security Resource Manager
Secret Resource Manager
Security Reference Monitor
Security Reference Manual
C. Security Reference Monitor
XCOPY
Edit
Sys
None of the above
semget()
msgrcv()
shmget()
mknod()
interruption
interception
fabrication
modification
Hibernate
Sleep
Restart
Shut Down
To cancel the print job
To check status of files in the print queue
To interrupt printing
All of the above
40 Mbytes
60 Mbytes
40 Gbytes
60 Gbytes
Start menu
Dialog boxes
Taskbar
All of above
The directory is moved the source file is not moved
All the subdirectory inside that directory are moved
All files inside the directory are moved
Both b and c
Basic Software Division
Berkeley Software Distribution
British Software Distribution
Berkeley Software data
The system should not enter a state in which nodes spend all their time migrating processes or exchanging control messages without doing any useful work.
The system should be able to handle small and large networked systems.
The algorithm should not be affected by the crash of one or more nodes in the system.
The process assignment decisions should be based on the current load of the system and not on some fixed static policy.
Semaphore
Deadlock
Mutual Exclusion
No preemption
Turnaround time
Dispatch Latency
Access time
Response time
UNIX systems originally came with a command interpreter called the Bourne Shell.
The cat command takes any characters from standard input, and then echoes them to standard output.
A pipe is a means of taking the output of one command and directing it as another command.
The manual entry is called a man page, even though it is often more than one page long.
Priority encoded arbitration
Distributed arbitration by self-selection
Priority arbitration
Daisy chain arbitration
In computer terminology, variables are symbols which stand for some value.
An alternative method for executing the commands in the file backup is to make the file as directory.
The restricted shell gives more control to the system administrator and restricts the options of the user.
The decision making done by computer programs is in the form of conditional execution.
IFS
TERM
PATH
Linux is a proprietary whereas Windows is not
Windows can run with an Intel processor, whereas Linux cannot
There are multiple versions of Linux, but only one version of Windows
Any programmer can modify Linux code which is not permitted with Windows
Security Resource Manager
Secret Resource Manager
Security Reference Monitor
Security Reference Manual
RAM
virtual memory
BIOS
Operating System
the Cell Directory Service
the Global Directory Service
the Global Directory Agent
A,B and C
They are large integers or bit strings.
They are of the same size
Generally shorter than human-oriented names and are easy for manipulations like hashing, sorting and so on.
All A, B, C
Transfer system files after format
Do not check/scan surface after format
Destroys every byte of data on a disk by overwriting it with with blank spaces
All of above
semget()
semsget()
mknod()
sempget()
program
language
translator
package
Operating system
Operating environment
System environment
None
Copy
Paste
Transfer
None of the above
Cleaning policy
Fetch policy
Frame locking
None
availability
confidentiality
integrity
authenticity
Explicit replication
Implicit replication
Lazy file replication
Group file replication
COMMANCOM
START.COM
VER.COM
TREE.COM