Related Questions
What is the correct answer?
4
All of the following are TRUE regarding virtual memory EXCEPT
A. Any amount of RAM can be allocated to virtual memory
B. The setting for the amount of hard disk drive space to allocate virtual memory can be manually change
C. This temporary storage is called the swap file or page file
D. Virtual memory is the physical space o the hard drive
What is the correct answer?
4
When a peripheral device needs immediate attention from the operating system, it generates a(n)
What is the correct answer?
4
In Windows, start button is used to
What is the correct answer?
4
Two clocks are said to be synchronized at a particular instance of time if the difference in time values of the two clocks is less than some specified constant. The difference in time values of two clocks is called ___________.
What is the correct answer?
4
The ___ contains commands associated with the My Computer window
What is the correct answer?
4
____________approach can place the data directly into the memory or take the data directly from the memory without direct intervention from the processor.
B. Daisy chain arbitration
What is the correct answer?
4
Transparent RPC mechanism refers to :
A. Existance of multuple computer visible and a provide a single system image to its users.
B. It runs the program transparently.
C. It is a technique to shift the program to other computer.
D. It is technique in which local procedures and remote procedures are indistinguishable to programmers.
What is the correct answer?
4
Wiretapping to capture data in a network is an example of ________________
What is the correct answer?
4
Load balancing algorithms in ______________ class use the processor and process characteristics to allocate processes to nodes.
What is the correct answer?
4
RPN stands for
A. Reverse Polish Notation
B. Record Police Notation
C. Record Polish Notation
D. Reverse Police Negation
What is the correct answer?
4
In___________, the requesting device or devices assert the signal bus_request.
A. Priority encoded arbitration
B. Distributed arbitration by self-selection
D. Daisy chain arbitration
What is the correct answer?
4
When a child dies, it sends a _______________signal to its parent.
What is the correct answer?
4
The problem with logical dumping is ________________
What is the correct answer?
4
______________is a mechanism the prevents two or more processes from accessing a shared resource simultaneously.
What is the correct answer?
4
The name services of DCE include ________
A. the Cell Directory Service
B. the Global Directory Service
C. the Global Directory Agent
What is the correct answer?
4
The command used to create logical drive for specific location of disk
What is the correct answer?
4
Underlined text, such as text and folder names is referred to as
What is the correct answer?
4
_____________ manage the name spaces and binds an object to its location.
What is the correct answer?
4
______________approach simplifies debugging and system verification.
What is the correct answer?
4
The ______________ unpacks the call receipt messages from local RPC Runtime and makes a perfect local call to invoke the appropriate procedure in the server.
What is the correct answer?
4
The essential difference between an operating system like Linux and one like Windows is that
A. Linux is a proprietary whereas Windows is not
B. Windows can run with an Intel processor, whereas Linux cannot
C. There are multiple versions of Linux, but only one version of Windows
D. Any programmer can modify Linux code which is not permitted with Windows
What is the correct answer?
4
To install the new font
A. Start -> setting -> font
B. Start -> control panel -> font -> install new font
C. Start -> setting -> control panel -> font -> install new font
D. Start -> setting -> control panel -> font
What is the correct answer?
4
Process migration involves__________________
A. Selection of a process to be migrated
B. Selection of destination system or node
C. Actual transfer of the selected process to the destination system or node
What is the correct answer?
4
A shared memory segment first needs to be allocated (create, using the__________ system call.
What is the correct answer?
4
In the case of____________ , changes to an open file are only locally visible.
What is the correct answer?
4
Identify the distributed computing model from the following statement. In this model, the user's processes need not be migrated to the server machines for getting the work done by those machines.
C. Workstation-Server model
What is the correct answer?
4
______________ is a situation in which two computer programs sharing the same resource are effectively preventing each other from accessing the resource, resulting in both programs ceasing to function.
What is the correct answer?
4
The usual su command syntax is
What is the correct answer?
4
_________, as a feature of good distributed file system, clients should be able to continue working if a file server crashes. Likewise, data must not be lost and a restarted file server must be able to recover to a valid state.
What is the correct answer?
4
Windows 2000 supports -------------- type of file system