Related Questions
What is the correct answer?
4
Transparent RPC mechanism refers to :
A. Existance of multuple computer visible and a provide a single system image to its users.
B. It runs the program transparently.
C. It is a technique to shift the program to other computer.
D. It is technique in which local procedures and remote procedures are indistinguishable to programmers.
What is the correct answer?
4
Which of the following is suitable after you install new drivers?
What is the correct answer?
4
The ___ contains commands associated with the My Computer window
What is the correct answer?
4
What is dispatch latency?
A. The time taken by the dispatcher to stop one process and start another
B. The whole time taken by all processor
C. The time taken by the processor to write a file into disk
What is the correct answer?
4
_______refers to the block size of the DSM system, i.e. to the units of sharing and the unit of data transfer across the network when a network block fault occurs.
What is the correct answer?
4
A solution to starvation is _____________.
What is the correct answer?
4
Which of the following is an essential file of a MS-DOS boot disk?
What is the correct answer?
4
__ is the program run on a computer when the computer boots up
What is the correct answer?
4
An unauthorized party inserts counterfeit objects into the system is called_________________
What is the correct answer?
4
____________approach can place the data directly into the memory or take the data directly from the memory without direct intervention from the processor.
B. Daisy chain arbitration
What is the correct answer?
4
____ runs on a computer hardware and serves as a platform for other system to run on
What is the correct answer?
4
A program to be executed must be in ---------------
What is the correct answer?
4
When copying more than one file at a time, you must specify an existing directory as the ___________
What is the correct answer?
4
In case of ________________the server automatically copies files to other servers after the files are written.
D. Group file replication
What is the correct answer?
4
The usual su command syntax is
What is the correct answer?
4
Two clocks are said to be synchronized at a particular instance of time if the difference in time values of the two clocks is less than some specified constant. The difference in time values of two clocks is called ___________.
What is the correct answer?
4
Which one of the following statements is true?
A. The cat command cares which file it receives as input or where the input goes.
B. Relative pathnames begin with something other than the slash character
C. UNIX shells never remember their current working directory (CW.
D. The cat command interprets -X as an option character rather than a pathname.
What is the correct answer?
4
A shared memory segment first needs to be allocated (create, using the__________ system call.
What is the correct answer?
4
Whenever you move a directory from one location to another
A. The directory is moved the source file is not moved
B. All the subdirectory inside that directory are moved
C. All files inside the directory are moved
What is the correct answer?
4
To install the new font
A. Start -> setting -> font
B. Start -> control panel -> font -> install new font
C. Start -> setting -> control panel -> font -> install new font
D. Start -> setting -> control panel -> font
What is the correct answer?
4
The find command is different from most UNIX commands in that each of the argument expressions following the beginning path name is considered a _____________
What is the correct answer?
4
Which buffering strategy is used for implementing synchronous communication?
B. Unbounded - Capacity buffer
What is the correct answer?
4
In case of modification an unauthorized party not only gains access to but tampers with an asset. This is an attack on ____________________.
What is the correct answer?
4
Fsck conducts a check in _____ phases
What is the correct answer?
4
______________is a mechanism the prevents two or more processes from accessing a shared resource simultaneously.
What is the correct answer?
4
The Network Time Protocol is similar to _______________algorithm in that synchronization is also performed using time servers and an attempt is made to correct for communication latencies.
What is the correct answer?
4
In MS-DOS, the interfaces and levels of functionality are _______________
What is the correct answer?
4
In case of good process migration mechanism, _____________ means failure of any node other than the one on which the process is running should not affect the execution of the process.
What is the correct answer?
4
In___________, the requesting device or devices assert the signal bus_request.
A. Priority encoded arbitration
B. Distributed arbitration by self-selection
D. Daisy chain arbitration
What is the correct answer?
4
A small part of taskbar that has icons of background running applications is