Home

The command used to create logical drive for specific location of disk

A. Format

B. Fdisk

C. Subst

D. All of the above

You can do it
  1. A process may create a new process by executing ___________system call.
  2. _________, as a feature of good distributed file system, clients should be able to continue working…
  3. Process migration involves__________________
  4. What is the function of radio button?
  5. In case of good process migration mechanism, _____________ means failure of any node other than the…
  6. A _______________in a distributed system is a string of bits or characters that is used to refer to…
  7. _____________typically contains temporary data such as subroutine parameter, return address, and temporary…
  8. Identify the server:This type of server generally remains in existence indefinitely. It is shared by…
  9. ____________ file system allows sharing in multiple different locations grouped under one folder.
  10. When a peripheral device needs immediate attention from the operating system, it generates a(n)
  11. A small part of taskbar that has icons of background running applications is
  12. The two sub systems of user mode layer of windows 2000 are _________ and __________
  13. __ is the program run on a computer when the computer boots up
  14. The Network Time Protocol is similar to _______________algorithm in that synchronization is also performed…
  15. ______________ refers to the technology in which some space in hard disk is used as an extension of…
  16. In Windows, start button is used to
  17. ___________variable is not automatically created on all UNIX systems but is used by so many programs…
  18. In _______, if a processor writes the value 100 to the memory location x, this write operation will…
  19. Find out the characteristics of System-oriented names:
  20. In layered approach each layer uses the functions and services of ------------------
  21. One of the wonderful things about UNIX is its ___________names.
  22. In case of modification an unauthorized party not only gains access to but tampers with an asset. This…
  23. ____________approach can place the data directly into the memory or take the data directly from the…
  24. The ______________ unpacks the call receipt messages from local RPC Runtime and makes a perfect local…
  25. The command used to create logical drive for specific location of disk
  26. To install the new font
  27. The problem with logical dumping is ________________
  28. The _________takes any characters from standard input, and then echoes them to standard output.
  29. In case of ________________the server automatically copies files to other servers after the files are…
  30. Initialization of I/O devices is part of the_________.