The Network Time Protocol is similar to _______________algorithm in that synchronization is also performed using time servers and an attempt is made to correct for communication latencies.

A. Banker's

B. Divide and conquer's

C. Cristians

D. Xdelta's

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. Windows 2000 supports -------------- type of file system
  2. A _____________is a collection of processors that do not share memory, peripheral devices,or a clock.
  3. A process is _________________
  4. A process may create a new process by executing ___________system call.
  5. An unauthorized party inserts counterfeit objects into the system is called_________________
  6. RPN stands for
  7. In MS-DOS, the interfaces and levels of functionality are _______________
  8. Ext2 is the standard file system of _______ and uses a block size of_____bytes
  9. A sequence of instructions telling the computer what to do is called a_____________
  10. An orphan process is automatically inherited by the _____and becomes a _______ of this process.
  11. You can move a window to a different position on your screen by dragging it by its
  12. __________ deals with when a modified page should be written out to secondary memory.
  13. _________, as a feature of good distributed file system, clients should be able to continue working…
  14. Transparent RPC mechanism refers to :
  15. When resources have multiple instances ________ is used for deadlock Avoidance.
  16. A two-byte integer called ____________is interpreted as an index into an array of inodes in a fixed,…
  17. Load balancing algorithms in ______________ class use the processor and process characteristics to allocate…
  18. The _____________ are based on modification of the original message in some manner, or on creation of…
  19. _______________refers to a strategy where whenever a resource is requested, it is only granted if it…
  20. Which components appear in the initial Windows start up display?
  21. Bootstrapping is also known as ______
  22. An option commonly takes the form of a _____followed by __________characters.
  23. The problem with logical dumping is ________________
  24. In_________________ model, when a process does a release access, the contents of all the modifications…
  25. ____ runs on a computer hardware and serves as a platform for other system to run on
  26. Taskbar is used for
  27. The two sub systems of user mode layer of windows 2000 are _________ and __________
  28. What do you mean by 0-reliable level in multicast communication?
  29. Creation of a semaphore set is done using the _______system call.
  30. The early ARPAnet is an example of a distributed computing system based on the ________________.