Home

The maximum size of a write file is limited to only

A. Name of the file

B. Extension of the file

C. The amount of memory in your computer

D. All of above

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. ___________variable is not automatically created on all UNIX systems but is used by so many programs…
  2. In MS-DOS, the interfaces and levels of functionality are _______________
  3. You can use print manage window
  4. A standard UNIX system includes a set of ___________ and a set of ___________.
  5. _______refers to the block size of the DSM system, i.e. to the units of sharing and the unit of data…
  6. The operating system is the most common type of ___ Software
  7. Which of the following is an essential file of a MS-DOS boot disk?
  8. A process control block contains varies attributes required by _____________ to control a process.
  9. When copying more than one file at a time, you must specify an existing directory as the ___________
  10. In layered approach each layer uses the functions and services of ------------------
  11. The essential difference between an operating system like Linux and one like Windows is that
  12. The time taken by the Dispatcher to stop one process and start another running is known as _________________.
  13. Once text has been cut to the clipboard, you can____hat text into another document
  14. An operating system version designed for use with a media center PC is Microsoft Windows XP
  15. The find command is different from most UNIX commands in that each of the argument expressions following…
  16. In ________________________ each node periodically sends a message to the time server.
  17. BSD stands for_____________________
  18. A _______________in a distributed system is a string of bits or characters that is used to refer to…
  19. In case of modification an unauthorized party not only gains access to but tampers with an asset. This…
  20. Which of the following is drop down list?
  21. Fsck conducts a check in _____ phases
  22. ______________approach simplifies debugging and system verification.
  23. __________ deals with when a modified page should be written out to secondary memory.
  24. The controller can access memory in memory cycles which are not used by the particular bank of memory…
  25. Having data belonging to two independent processes in the same page is called____________.
  26. The primary purpose of an operating system is a …
  27. _______________refers to a strategy where whenever a resource is requested, it is only granted if it…
  28. IPC stands for _________
  29. Recently deleted files are stored in
  30. When a child dies, it sends a _______________signal to its parent.