Bringing a page into memory only when it is needed, this mechanism is called Dormant Paging Page Fault Deadlock Demand Paging TRUE ANSWER : ? YOUR ANSWER : ?
Trojan-Horse programs usually are immediately discovered are hidden programs that do not show up on the system are legitimate programs that allow unauthorized access None of these do not usually work TRUE ANSWER : ? YOUR ANSWER : ?
A program that converts a high-level language program to a set of instructions that can run on a computer is called a Compiler Editor All of these None of these Debugger TRUE ANSWER : ? YOUR ANSWER : ?
Indicate which, of the following, is not true about Nassi-Shneiderman charts All of these These charts cannot represent CASE constructs These charts are type of graphical design tool None of these These charts can represent three fundamental control structures TRUE ANSWER : ? YOUR ANSWER : ?
Work group means Connection Individual user Computer in network All of these TRUE ANSWER : ? YOUR ANSWER : ?
What hole will allocates in "Worst-Fit" algorithm of memory management? It allocates the smallest hole from the available memory holes It allocates the largest hole from the available memory holes It allocates the smaller hole than required memory hole It allocates the exact same size memory hole TRUE ANSWER : ? YOUR ANSWER : ?
The memory which allocates space for DOS and application is called Conventional memory Virtual memory Expanded memory Cache memory TRUE ANSWER : ? YOUR ANSWER : ?
The operating system is the most common type of ___ software Word processing software Application System Communication TRUE ANSWER : ? YOUR ANSWER : ?
Where will store data first time when you copy Clipboard Clipbook Hard disk CD TRUE ANSWER : ? YOUR ANSWER : ?