Related Questions
What is the correct answer?
4
Underlined text, such as text and folder names is referred to as
What is the correct answer?
4
In _______, if a processor writes the value 100 to the memory location x, this write operation will only change the contents of its local memory and will not affect the contents of the memory of any other processor.
A. Tightly coupled systems,
B. Loosely coupled systems
C. Parallel processing systems
D. File management system
What is the correct answer?
4
Identify the distributed computing model from the following statement. In this model, the user's processes need not be migrated to the server machines for getting the work done by those machines.
C. Workstation-Server model
What is the correct answer?
4
Wiretapping to capture data in a network is an example of ________________
What is the correct answer?
4
In the case of____________ , changes to an open file are only locally visible.
What is the correct answer?
4
The early ARPAnet is an example of a distributed computing system based on the ________________.
What is the correct answer?
4
PVM stands for
A. Parallel Virtual Machine
B. Parallel Virtual Message
C. Process Virtual Machine
D. Process Virtual Monitor
What is the correct answer?
4
The primary purpose of an operating system is:
A. To allow people to use the computer,
B. To make the most efficient use of the computer hardware
C. To make computers easier to use
D. To keep systems programmers employed
What is the correct answer?
4
____ runs on a computer hardware and serves as a platform for other system to run on
What is the correct answer?
4
_________, as a feature of good distributed file system, clients should be able to continue working if a file server crashes. Likewise, data must not be lost and a restarted file server must be able to recover to a valid state.
What is the correct answer?
4
An option commonly takes the form of a _____followed by __________characters.
What is the correct answer?
4
In Multics, a process could have up to 256K segments, but each segment was limited to ___________ 64K words.
What is the correct answer?
4
Which of the following is an essential file of a MS-DOS boot disk?
What is the correct answer?
4
Identify the server:
This type of server generally remains in existence indefinitely. It is shared by many clients. Servers of this type are created and installed before the clients use them.
A. Instance-per-call-servers
C. Non-Persistent Servers
What is the correct answer?
4
Taskbar is used for
C. Switching between program
What is the correct answer?
4
One of the wonderful things about UNIX is its ___________names.
What is the correct answer?
4
What is dispatch latency?
A. The time taken by the dispatcher to stop one process and start another
B. The whole time taken by all processor
C. The time taken by the processor to write a file into disk
What is the correct answer?
4
A _______________in a distributed system is a string of bits or characters that is used to refer to an entity.
What is the correct answer?
4
In MS-DOS, the interfaces and levels of functionality are _______________
What is the correct answer?
4
Bootstrapping is also known as ______
What is the correct answer?
4
IDL stands for_____________________
A. Integrated Data library
C. Interface Data Language
D. Interface Definition Language
What is the correct answer?
4
Two clocks are said to be synchronized at a particular instance of time if the difference in time values of the two clocks is less than some specified constant. The difference in time values of two clocks is called ___________.
What is the correct answer?
4
Which buffering strategy is used for implementing synchronous communication?
B. Unbounded - Capacity buffer
What is the correct answer?
4
Which components appear in the initial windows start up display?
What is the correct answer?
4
A _____________is a collection of processors that do not share memory, peripheral devices,or a clock.
What is the correct answer?
4
In case of modification an unauthorized party not only gains access to but tampers with an asset. This is an attack on ____________________.
What is the correct answer?
4
IPC stands for _________
A. Integrated parallel communication
B. Intermediate process call
D. Inter process communication
What is the correct answer?
4
_______refers to the block size of the DSM system, i.e. to the units of sharing and the unit of data transfer across the network when a network block fault occurs.
What is the correct answer?
4
RPN stands for
A. Reverse Polish Notation
B. Record Police Notation
C. Record Polish Notation
D. Reverse Police Negation
What is the correct answer?
4
DSM stands for______________
C. Distributed shared memory
D. Distributed system memory