Related Questions
What is the correct answer?
4
In_________________ model, when a process does a release access, the contents of all the modifications are not immediately sent to other nodes but they are sent only on demand.
A. Release Consistency Model
B. Lazy Release consistency model
C. Weak Consistency Model
D. Processor Consistency Model
What is the correct answer?
4
_______refers to the block size of the DSM system, i.e. to the units of sharing and the unit of data transfer across the network when a network block fault occurs.
What is the correct answer?
4
PVM stands for
A. Parallel Virtual Machine
B. Parallel Virtual Message
C. Process Virtual Machine
D. Process Virtual Monitor
What is the correct answer?
4
Initialization of I/O devices is part of the_________.
What is the correct answer?
4
______________approach simplifies debugging and system verification.
What is the correct answer?
4
The early ARPAnet is an example of a distributed computing system based on the ________________.
What is the correct answer?
4
The Bankers algorithm is used
What is the correct answer?
4
The name services of DCE include ________
A. the Cell Directory Service
B. the Global Directory Service
C. the Global Directory Agent
What is the correct answer?
4
A page fault occurs when
A. the page is not found in the memory
B. the page is found in the memory
C. the Segmentation starts
What is the correct answer?
4
_____________typically contains temporary data such as subroutine parameter, return address, and temporary variables.
A. Current value of Program Counter
B. Value of the variables
What is the correct answer?
4
In ________________________ each node periodically sends a message to the time server.
A. Passive Time Server Centralized Algorithm
B. Active Time Server Centralized Algorithm
C. Global Averaging Distributed Algorithms
D. Localized Averaging Distributed Algorithms
What is the correct answer?
4
Creation of a semaphore set is done using the _______system call.
What is the correct answer?
4
______________ selects a process from among the ready processes to execute on the CPU.
What is the correct answer?
4
Identify the server:
This type of server generally remains in existence indefinitely. It is shared by many clients. Servers of this type are created and installed before the clients use them.
A. Instance-per-call-servers
C. Non-Persistent Servers
What is the correct answer?
4
Transparent RPC mechanism refers to :
A. Existance of multuple computer visible and a provide a single system image to its users.
B. It runs the program transparently.
C. It is a technique to shift the program to other computer.
D. It is technique in which local procedures and remote procedures are indistinguishable to programmers.
What is the correct answer?
4
When copying more than one file at a time, you must specify an existing directory as the ___________
What is the correct answer?
4
Which buffering strategy is used for implementing synchronous communication?
B. Unbounded - Capacity buffer
What is the correct answer?
4
Taskbar is used for
C. Switching between program
What is the correct answer?
4
The controller can access memory in memory cycles which are not used by the particular bank of memory into which the DMA controller is writing data. This approach, called _________
What is the correct answer?
4
SRM stands for
A. Security Resource Manager
B. Secret Resource Manager
C. Security Reference Monitor
D. Security Reference Manual
What is the correct answer?
4
Which of the following is drop down list?
What is the correct answer?
4
An unauthorized party inserts counterfeit objects into the system is called_________________
What is the correct answer?
4
What is the function of radio button?
A. To select multiple option
B. To select single option
What is the correct answer?
4
The usual su command syntax is
What is the correct answer?
4
In case of modification an unauthorized party not only gains access to but tampers with an asset. This is an attack on ____________________.
What is the correct answer?
4
______________ is a situation in which two computer programs sharing the same resource are effectively preventing each other from accessing the resource, resulting in both programs ceasing to function.
What is the correct answer?
4
A process is already split into pieces, called________________.
What is the correct answer?
4
In the case of____________, message remains in the senders address space until the receiver executes the corresponding receive.
B. Single message buffering
C. Unbounded-capacity buffer
What is the correct answer?
4
Identify the distributed computing model from the following statement. In this model, the user's processes need not be migrated to the server machines for getting the work done by those machines.
C. Workstation-Server model
What is the correct answer?
4
Most accurate global time is based on oscillations of the ______________