Transfer system files after format
Do not check/scan surface after format
Destroys every byte of data on a disk by overwriting it with with blank spaces
All of above
C. Destroys every byte of data on a disk by overwriting it with with blank spaces
'init' process, father
'init' process, child
'initial process, father
'it' process, child
The time taken by the dispatcher to stop one process and start another
The whole time taken by all processor
The time taken by the processor to write a file into disk
None of Above
Release Consistency Model
Lazy Release consistency model
Weak Consistency Model
Processor Consistency Model
Deadlock Prevention
Livelock
Deadlock avoidance
none of these
Direct shared memory
Direct system memory
Distributed shared memory
Distributed system memory
System software
Operating system
System operations
None
Multiple responses is expected from any receivers.
No response is expected from any receivers.
Multiple responses is expected from multiple receivers.
A multicast message is received by all the members of the group or none.
40 Mbytes
60 Mbytes
40 Gbytes
60 Gbytes
Basic Software Division
Berkeley Software Distribution
British Software Distribution
Berkeley Software data
Dialog box
Task bar
Start menu
All of the above
interruption
interception
fabrication
modification
Robustness
Efficiency
Transparent
Interference
Priority encoded arbitration
Distributed arbitration by self-selection
Priority arbitration
Daisy chain arbitration
UNIX systems originally came with a command interpreter called the Bourne Shell.
The cat command takes any characters from standard input, and then echoes them to standard output.
A pipe is a means of taking the output of one command and directing it as another command.
The manual entry is called a man page, even though it is often more than one page long.
the Cell Directory Service
the Global Directory Service
the Global Directory Agent
A,B and C
Name of the file
Extension of the file
The amount of memory in your computer
All of above
interrupting
cycle stealing
swapping
paging
polling
arbitration
handshaking
interrupting
System
Application
Word processing software
Communication
Location
Migration
Replication
Concurrency
init
fork
create
new
Passive attack
Release of message content attack
Traffic analysis attack
Active attack
Cleaning policy
Fetch policy
Frame locking
None
Device setting
Run applications
All of above
Turn off the system
IT Expert
Diagnosis tool
Surgeon
None
Bankers algorithm
Resource Allocation Graph
semaphores
all of these
kill character
cat command
cate command
control command
Start menu
Standard menu
System menu
None of the above
Explicit replication
Implicit replication
Lazy file replication
Group file replication
Single message buffer
Unbounded - Capacity buffer
Finite-Bound Buffer
All can be used.