Related Questions
What is the correct answer?
4
Which buffering strategy is used for implementing synchronous communication?
B. Unbounded - Capacity buffer
What is the correct answer?
4
The operating system is the most common type of ___ Software
C. Word processing software
What is the correct answer?
4
The Network Time Protocol is similar to _______________algorithm in that synchronization is also performed using time servers and an attempt is made to correct for communication latencies.
What is the correct answer?
4
You can use print manage window
A. To cancel the print job
B. To check status of files in the print queue
What is the correct answer?
4
__________ deals with when a modified page should be written out to secondary memory.
What is the correct answer?
4
Because the I/O devices are not synchronized with the CPU, some information must be exchanged between the CPU and the device to ensure that the data is received reliably. This interaction between the CPU and an I/O device is usually referred to as ____________
What is the correct answer?
4
The find command is different from most UNIX commands in that each of the argument expressions following the beginning path name is considered a _____________
What is the correct answer?
4
In Windows, start button is used to
What is the correct answer?
4
In layered approach each layer uses the functions and services of ------------------
What is the correct answer?
4
Which of the following is not essential to shut down your computer?
What is the correct answer?
4
_________, as a feature of good distributed file system, clients should be able to continue working if a file server crashes. Likewise, data must not be lost and a restarted file server must be able to recover to a valid state.
What is the correct answer?
4
The _____________ are based on modification of the original message in some manner, or on creation of a false message.
B. Release of message content attack
C. Traffic analysis attack
What is the correct answer?
4
______________ refers to the technology in which some space in hard disk is used as an extension of main memory.
What is the correct answer?
4
____________approach can place the data directly into the memory or take the data directly from the memory without direct intervention from the processor.
B. Daisy chain arbitration
What is the correct answer?
4
When resources have multiple instances ________ is used for deadlock Avoidance.
B. Resource Allocation Graph
What is the correct answer?
4
All of the following are TRUE regarding virtual memory EXCEPT
A. Any amount of RAM can be allocated to virtual memory
B. The setting for the amount of hard disk drive space to allocate virtual memory can be manually change
C. This temporary storage is called the swap file or page file
D. Virtual memory is the physical space o the hard drive
What is the correct answer?
4
Which command is used to display the contents of the text file of DOS?
What is the correct answer?
4
In case of good process migration mechanism, _____________ means failure of any node other than the one on which the process is running should not affect the execution of the process.
What is the correct answer?
4
_____________typically contains temporary data such as subroutine parameter, return address, and temporary variables.
A. Current value of Program Counter
B. Value of the variables
What is the correct answer?
4
The primary purpose of an operating system is:
A. To allow people to use the computer,
B. To make the most efficient use of the computer hardware
C. To make computers easier to use
D. To keep systems programmers employed
What is the correct answer?
4
______________ selects a process from among the ready processes to execute on the CPU.
What is the correct answer?
4
______________approach simplifies debugging and system verification.
What is the correct answer?
4
A page fault occurs when
A. the page is not found in the memory
B. the page is found in the memory
C. the Segmentation starts
What is the correct answer?
4
IDL stands for_____________________
A. Integrated Data library
C. Interface Data Language
D. Interface Definition Language
What is the correct answer?
4
Which of the following is suitable after you install new drivers?
What is the correct answer?
4
What is dispatch latency?
A. The time taken by the dispatcher to stop one process and start another
B. The whole time taken by all processor
C. The time taken by the processor to write a file into disk
What is the correct answer?
4
_______________refers to a strategy where whenever a resource is requested, it is only granted if it cannot result in deadlock.
What is the correct answer?
4
In case of ____________________transparency a file can transparently move to another server.
What is the correct answer?
4
__ is the program run on a computer when the computer boots up
What is the correct answer?
4
An option commonly takes the form of a _____followed by __________characters.