Related Questions
What is the correct answer?
4
Which of the following is drop down list?
What is the correct answer?
4
Two clocks are said to be synchronized at a particular instance of time if the difference in time values of the two clocks is less than some specified constant. The difference in time values of two clocks is called ___________.
What is the correct answer?
4
Find out the characteristics of System-oriented names:
A. They are large integers or bit strings.
B. They are of the same size
C. Generally shorter than human-oriented names and are easy for manipulations like hashing, sorting and so on.
What is the correct answer?
4
Which command is used to display the contents of the text file of DOS?
What is the correct answer?
4
The name services of DCE include ________
A. the Cell Directory Service
B. the Global Directory Service
C. the Global Directory Agent
What is the correct answer?
4
IDL stands for_____________________
A. Integrated Data library
C. Interface Data Language
D. Interface Definition Language
What is the correct answer?
4
Load balancing algorithms in ______________ class use the processor and process characteristics to allocate processes to nodes.
What is the correct answer?
4
PVM stands for
A. Parallel Virtual Machine
B. Parallel Virtual Message
C. Process Virtual Machine
D. Process Virtual Monitor
What is the correct answer?
4
The two sub systems of user mode layer of windows 2000 are _________ and __________
What is the correct answer?
4
______________ occurs when multiple processes or threads read and write data items so that the final result depends on the order of execution of instructions in the multiple processes.
What is the correct answer?
4
The _________takes any characters from standard input, and then echoes them to standard output.
What is the correct answer?
4
The primary purpose of an operating system is a …
A. To allow people to use the computer
B. To make the most efficient use of computer hardware
C. To make computer easier to use
D. To keep system programmer employed
What is the correct answer?
4
A process may create a new process by executing ___________system call.
What is the correct answer?
4
In case of modification an unauthorized party not only gains access to but tampers with an asset. This is an attack on ____________________.
What is the correct answer?
4
In case of ____________________transparency a file can transparently move to another server.
What is the correct answer?
4
A solution to starvation is _____________.
What is the correct answer?
4
The find command is different from most UNIX commands in that each of the argument expressions following the beginning path name is considered a _____________
What is the correct answer?
4
_______refers to the block size of the DSM system, i.e. to the units of sharing and the unit of data transfer across the network when a network block fault occurs.
What is the correct answer?
4
A program to be executed must be in ---------------
What is the correct answer?
4
_______________occurs when two or more execution flows are able to run simultaneously.
What is the correct answer?
4
____________approach can place the data directly into the memory or take the data directly from the memory without direct intervention from the processor.
B. Daisy chain arbitration
What is the correct answer?
4
What is dispatch latency?
A. The time taken by the dispatcher to stop one process and start another
B. The whole time taken by all processor
C. The time taken by the processor to write a file into disk
What is the correct answer?
4
A two-byte integer called ____________is interpreted as an index into an array of inodes in a fixed, known location on disk.
What is the correct answer?
4
In Windows, start button is used to
What is the correct answer?
4
The command used to create logical drive for specific location of disk
What is the correct answer?
4
The problem with logical dumping is ________________
What is the correct answer?
4
DSM stands for______________
C. Distributed shared memory
D. Distributed system memory
What is the correct answer?
4
______________ selects a process from among the ready processes to execute on the CPU.
What is the correct answer?
4
______________ is a situation in which two computer programs sharing the same resource are effectively preventing each other from accessing the resource, resulting in both programs ceasing to function.
What is the correct answer?
4
In_________________ model, when a process does a release access, the contents of all the modifications are not immediately sent to other nodes but they are sent only on demand.
A. Release Consistency Model
B. Lazy Release consistency model
C. Weak Consistency Model
D. Processor Consistency Model