Home

The two sub systems of user mode layer of windows 2000 are _________ and __________

A. excel, executive

B. environment, integral

C. orbit , kernel

D. Kernel , executive

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. In case of good process migration mechanism, _____________ means failure of any node other than the…
  2. In_________________ model, when a process does a release access, the contents of all the modifications…
  3. _________, as a feature of good distributed file system, clients should be able to continue working…
  4. The two sub systems of user mode layer of windows 2000 are _________ and __________
  5. The name services of DCE include ________
  6. The primary purpose of an operating system is:
  7. PVM stands for
  8. Wiretapping to capture data in a network is an example of ________________
  9. RPN stands for
  10. An operating system version designed for use with a media center PC is Microsoft Windows XP
  11. ______________is responsible for allocating primary memory to processes and for assisting the programmer…
  12. In case of ________________the server automatically copies files to other servers after the files are…
  13. Most accurate global time is based on oscillations of the ______________
  14. IPC stands for _________
  15. ______________ is a situation in which two computer programs sharing the same resource are effectively…
  16. Which of the following is an essential file of a MS-DOS boot disk?
  17. In ________________________ each node periodically sends a message to the time server.
  18. The date and time displays on
  19. In Multics, a process could have up to 256K segments, but each segment was limited to ___________ 64K…
  20. A shared memory segment first needs to be allocated (create, using the__________ system call.
  21. Transparent RPC mechanism refers to :
  22. Which buffering strategy is used for implementing synchronous communication?
  23. Find out the characteristics of System-oriented names:
  24. All of the following are TRUE regarding virtual memory EXCEPT
  25. In layered approach each layer uses the functions and services of ------------------
  26. Identify the distributed computing model from the following statement. In this model, the user's processes…
  27. A program to be executed must be in ---------------
  28. _______________refers to a strategy where whenever a resource is requested, it is only granted if it…
  29. Two clocks are said to be synchronized at a particular instance of time if the difference in time values…
  30. The primary purpose of an operating system is a …