Home

Which of the following is an essential file of a MS-DOS boot disk?

A. COMMANCOM

B. START.COM

C. VER.COM

D. TREE.COM

Related Questions

  1. What do you mean by 0-reliable level in multicast communication?
  2. ______________is a mechanism the prevents two or more processes from accessing a shared resource simultaneously.
  3. _________, as a feature of good distributed file system, clients should be able to continue working…
  4. The early ARPAnet is an example of a distributed computing system based on the ________________.
  5. Which buffering strategy is used for implementing synchronous communication?
  6. __ is the program run on a computer when the computer boots up
  7. What is the function of radio button?
  8. SRM stands for
  9. ____________approach can place the data directly into the memory or take the data directly from the…
  10. PVM stands for
  11. A two-byte integer called ____________is interpreted as an index into an array of inodes in a fixed,…
  12. The _________takes any characters from standard input, and then echoes them to standard output.
  13. A _____________is a collection of processors that do not share memory, peripheral devices,or a clock.
  14. The date and time displays on
  15. When copying more than one file at a time, you must specify an existing directory as the ___________
  16. Because the I/O devices are not synchronized with the CPU, some information must be exchanged between…
  17. ______________ is a situation in which two computer programs sharing the same resource are effectively…
  18. The two sub systems of user mode layer of windows 2000 are _________ and __________
  19. In layered approach each layer uses the functions and services of ------------------
  20. Once text has been cut to the clipboard, you can____hat text into another document
  21. Which of the following is suitable after you install new drivers?
  22. The problem with logical dumping is ________________
  23. In_________________ model, when a process does a release access, the contents of all the modifications…
  24. In case of modification an unauthorized party not only gains access to but tampers with an asset. This…
  25. A shared memory segment first needs to be allocated (create, using the__________ system call.
  26. In ________________________ each node periodically sends a message to the time server.
  27. A page fault occurs when
  28. Which of the following does not occur during the power-on-self-test (POST)?
  29. The usual su command syntax is
  30. A SCSI device can transfer up to----------- of information per second.

Please do not use chat terms. Example: avoid using "grt" instead of "great".