Home

Which buffering strategy is used for implementing synchronous communication?

A. Single message buffer

B. Unbounded - Capacity buffer

C. Finite-Bound Buffer

D. All can be used.

Related Questions

  1. Which of the following is drop down list?
  2. A process is _________________
  3. The _________takes any characters from standard input, and then echoes them to standard output.
  4. A shared memory segment first needs to be allocated (create, using the__________ system call.
  5. Pick the wrong statement from the following.
  6. The Bankers algorithm is used
  7. _______________refers to a strategy where whenever a resource is requested, it is only granted if it…
  8. The problem with logical dumping is ________________
  9. Because the I/O devices are not synchronized with the CPU, some information must be exchanged between…
  10. All of the following are TRUE regarding virtual memory EXCEPT
  11. _______________occurs when two or more execution flows are able to run simultaneously.
  12. When a child dies, it sends a _______________signal to its parent.
  13. In Multics, a process could have up to 256K segments, but each segment was limited to ___________ 64K…
  14. A page fault occurs when
  15. _________, as a feature of good distributed file system, clients should be able to continue working…
  16. Which buffering strategy is used for implementing synchronous communication?
  17. Underlined text, such as text and folder names is referred to as
  18. Windows 2000 supports -------------- type of file system
  19. ____________approach can place the data directly into the memory or take the data directly from the…
  20. Which one of the following statements is true?
  21. Which of the following is suitable after you install new drivers?
  22. Ext2 is the standard file system of _______ and uses a block size of_____bytes
  23. Which of the following is not essential to shut down your computer?
  24. In Windows, start button is used to
  25. Which one is true for unconditional disk formatting?
  26. In___________, the requesting device or devices assert the signal bus_request.
  27. The two sub systems of user mode layer of windows 2000 are _________ and __________
  28. Taskbar is used for
  29. Load balancing algorithms in ______________ class use the processor and process characteristics to allocate…
  30. In MS-DOS, the interfaces and levels of functionality are _______________

Please do not use chat terms. Example: avoid using "grt" instead of "great".