Multiple responses is expected from any receivers.
No response is expected from any receivers.
Multiple responses is expected from multiple receivers.
A multicast message is received by all the members of the group or none.
B. No response is expected from any receivers.
Multiple responses is expected from any receivers.
No response is expected from any receivers.
Multiple responses is expected from multiple receivers.
A multicast message is received by all the members of the group or none.
excel, executive
environment, integral
orbit , kernel
Kernel , executive
interruption
interception
fabrication
modification
Basic Software Division
Berkeley Software Distribution
British Software Distribution
Berkeley Software data
Operating system
Memory manager
Database administrator
RAM
COMMANCOM
START.COM
VER.COM
TREE.COM
Copy
Paste
Transfer
None of the above
SIGCHLD
EDEADLK
WNOHANG
SEDECHLD
Commands ,files
Libraries, Applications
Libraries, files
Files, Applications
Quick Response System
Time Sharing System
Batch Processing System
Real Time System
Existance of multuple computer visible and a provide a single system image to its users.
It runs the program transparently.
It is a technique to shift the program to other computer.
It is technique in which local procedures and remote procedures are indistinguishable to programmers.
Hyperlink
Menu
Source drive
None of these
Start menu
Dialog boxes
Taskbar
All of above
To allow people to use the computer
To make the most efficient use of computer hardware
To make computer easier to use
To keep system programmer employed
Broadcasting
Encoding Location of objects within UID
Searching creator node first and then broadcasting
All A, B, C
session semantics
immutable files
atomic transactions
None of the above.
name
attribute
identifiers
addresses
Minicomputer model
Workstation model
Hybrid model
Processor pool model
Robustness
Efficiency
Transparent
Interference
Buffering
Blocking
Message-passing
False sharing
Reverse Polish Notation
Record Police Notation
Record Polish Notation
Reverse Police Negation
64K
32K
1024K
112K
In computer terminology, variables are symbols which stand for some value.
An alternative method for executing the commands in the file backup is to make the file as directory.
The restricted shell gives more control to the system administrator and restricts the options of the user.
The decision making done by computer programs is in the form of conditional execution.
Tightly coupled systems,
Loosely coupled systems
Parallel processing systems
File management system
The system should not enter a state in which nodes spend all their time migrating processes or exchanging control messages without doing any useful work.
The system should be able to handle small and large networked systems.
The algorithm should not be affected by the crash of one or more nodes in the system.
The process assignment decisions should be based on the current load of the system and not on some fixed static policy.
Format
Fdisk
Subst
All of the above
Processes
Threads
Context switching
none of these
Bankers algorithm
Resource Allocation Graph
semaphores
all of these
Transfer system files after format
Do not check/scan surface after format
Destroys every byte of data on a disk by overwriting it with with blank spaces
All of above
No buffering
Single message buffering
Unbounded-capacity buffer
Finite bound buffer