interrupting
cycle stealing
swapping
paging
B. cycle stealing
Name of the file
Extension of the file
The amount of memory in your computer
All of above
RAM
ROM
The CPU
Memory Cache
Hyperlink
Menu
Source drive
None of these
main memory
secondary memory
virtual memory
Read only memory
Taskbar
Desktop
My computer
Recycle bin
CPU Scheduler
Loader
Dispatcher
Compiler
Minicomputer model
Workstation model
Workstation-Server model
Processor pool model
Operating system
Memory manager
Database administrator
RAM
'init' process, father
'init' process, child
'initial process, father
'it' process, child
very costly
very slow
human errors
all of these
The directory is moved the source file is not moved
All the subdirectory inside that directory are moved
All files inside the directory are moved
Both b and c
excel, executive
environment, integral
orbit , kernel
Kernel , executive
Release Consistency Model
Lazy Release consistency model
Weak Consistency Model
Processor Consistency Model
Existance of multuple computer visible and a provide a single system image to its users.
It runs the program transparently.
It is a technique to shift the program to other computer.
It is technique in which local procedures and remote procedures are indistinguishable to programmers.
System software
Operating system
Application system
All of above
Dialog box
Task bar
Start menu
All of the above
program
language
translator
package
the page is not found in the memory
the page is found in the memory
the Segmentation starts
the Deadlock happens
CPU
MSDOS
UNIX kernel
None of the above
Parallel Virtual Machine
Parallel Virtual Message
Process Virtual Machine
Process Virtual Monitor
Unlimited path
Unlimited directory
Limited path
Limited file
Direct shared memory
Direct system memory
Distributed shared memory
Distributed system memory
SIGCHLD
EDEADLK
WNOHANG
SEDECHLD
Deadlock
Concurrency
race condition
interrupt
Banker's
Divide and conquer's
Cristians
Xdelta's
Explicit replication
Implicit replication
Lazy file replication
Group file replication
Buffering
Blocking
Message-passing
False sharing
Reverse Polish Notation
Record Police Notation
Record Polish Notation
Reverse Police Negation
Minicomputer model
Workstation model
Hybrid model
Processor pool model
Multiple responses is expected from any receivers.
No response is expected from any receivers.
Multiple responses is expected from multiple receivers.
A multicast message is received by all the members of the group or none.