Related Questions
What is the correct answer?
4
Taskbar is used for
C. Switching between program
What is the correct answer?
4
The maximum size of a write file is limited to only
C. The amount of memory in your computer
What is the correct answer?
4
The name services of DCE include ________
A. the Cell Directory Service
B. the Global Directory Service
C. the Global Directory Agent
What is the correct answer?
4
An operating system version designed for use with a media center PC is Microsoft Windows XP
What is the correct answer?
4
______________ is a situation in which two computer programs sharing the same resource are effectively preventing each other from accessing the resource, resulting in both programs ceasing to function.
What is the correct answer?
4
The problem with logical dumping is ________________
What is the correct answer?
4
Which of the following is/are external commands?
What is the correct answer?
4
In layered approach each layer uses the functions and services of ------------------
What is the correct answer?
4
_____________typically contains temporary data such as subroutine parameter, return address, and temporary variables.
A. Current value of Program Counter
B. Value of the variables
What is the correct answer?
4
BSD stands for_____________________
A. Basic Software Division
B. Berkeley Software Distribution
C. British Software Distribution
D. Berkeley Software data
What is the correct answer?
4
Which one is true for unconditional disk formatting?
A. Transfer system files after format
B. Do not check/scan surface after format
C. Destroys every byte of data on a disk by overwriting it with with blank spaces
What is the correct answer?
4
______________is a mechanism the prevents two or more processes from accessing a shared resource simultaneously.
What is the correct answer?
4
The command used to create logical drive for specific location of disk
What is the correct answer?
4
Transparent RPC mechanism refers to :
A. Existance of multuple computer visible and a provide a single system image to its users.
B. It runs the program transparently.
C. It is a technique to shift the program to other computer.
D. It is technique in which local procedures and remote procedures are indistinguishable to programmers.
What is the correct answer?
4
The essential difference between an operating system like Linux and one like Windows is that
A. Linux is a proprietary whereas Windows is not
B. Windows can run with an Intel processor, whereas Linux cannot
C. There are multiple versions of Linux, but only one version of Windows
D. Any programmer can modify Linux code which is not permitted with Windows
What is the correct answer?
4
_________, as a feature of good distributed file system, clients should be able to continue working if a file server crashes. Likewise, data must not be lost and a restarted file server must be able to recover to a valid state.
What is the correct answer?
4
A process is already split into pieces, called________________.
What is the correct answer?
4
The controller can access memory in memory cycles which are not used by the particular bank of memory into which the DMA controller is writing data. This approach, called _________
What is the correct answer?
4
When copying more than one file at a time, you must specify an existing directory as the ___________
What is the correct answer?
4
A _______________in a distributed system is a string of bits or characters that is used to refer to an entity.
What is the correct answer?
4
An option commonly takes the form of a _____followed by __________characters.
What is the correct answer?
4
Once text has been cut to the clipboard, you can____hat text into another document
What is the correct answer?
4
What do you mean by 0-reliable level in multicast communication?
A. Multiple responses is expected from any receivers.
B. No response is expected from any receivers.
C. Multiple responses is expected from multiple receivers.
D. A multicast message is received by all the members of the group or none.
What is the correct answer?
4
The _____________ are based on modification of the original message in some manner, or on creation of a false message.
B. Release of message content attack
C. Traffic analysis attack
What is the correct answer?
4
______________ refers to the technology in which some space in hard disk is used as an extension of main memory.
What is the correct answer?
4
Windows 2000 supports -------------- type of file system
What is the correct answer?
4
A standard UNIX system includes a set of ___________ and a set of ___________.
B. Libraries, Applications
What is the correct answer?
4
Identify the server:
This type of server generally remains in existence indefinitely. It is shared by many clients. Servers of this type are created and installed before the clients use them.
A. Instance-per-call-servers
C. Non-Persistent Servers
What is the correct answer?
4
The primary purpose of an operating system is a …
A. To allow people to use the computer
B. To make the most efficient use of computer hardware
C. To make computer easier to use
D. To keep system programmer employed
What is the correct answer?
4
__ is the program run on a computer when the computer boots up