Home
You can do it
  1. In MS-DOS, the interfaces and levels of functionality are _______________
  2. Objects location is found by _________________
  3. An unauthorized party inserts counterfeit objects into the system is called_________________
  4. Two clocks are said to be synchronized at a particular instance of time if the difference in time values…
  5. The find command is different from most UNIX commands in that each of the argument expressions following…
  6. The name services of DCE include ________
  7. A small part of taskbar that has icons of background running applications is
  8. Ext2 is the standard file system of _______ and uses a block size of_____bytes
  9. The usual su command syntax is
  10. The date and time displays on
  11. When copying more than one file at a time, you must specify an existing directory as the ___________
  12. _______________occurs when two or more execution flows are able to run simultaneously.
  13. Because the I/O devices are not synchronized with the CPU, some information must be exchanged between…
  14. _________, as a feature of good distributed file system, clients should be able to continue working…
  15. ______________ occurs when multiple processes or threads read and write data items so that the final…
  16. Which one of the following statements is true?
  17. A standard UNIX system includes a set of ___________ and a set of ___________.
  18. Find out the characteristics of System-oriented names:
  19. Process migration involves__________________
  20. Bootstrapping is also known as ______
  21. The time taken by the Dispatcher to stop one process and start another running is known as _________________.
  22. The early ARPAnet is an example of a distributed computing system based on the ________________.
  23. You can use print manage window
  24. Most accurate global time is based on oscillations of the ______________
  25. A _______________in a distributed system is a string of bits or characters that is used to refer to…
  26. In___________, the requesting device or devices assert the signal bus_request.
  27. IDL stands for_____________________
  28. _____________ manage the name spaces and binds an object to its location.
  29. Which of the following is/are external commands?
  30. Transparent RPC mechanism refers to :