Operating System (OS) User action such as keystroke or mouse click are referred to as Event Interrupt Tasks Processes Event Interrupt Tasks Processes ANSWER DOWNLOAD EXAMIANS APP
Operating System (OS) When you cut or copy the text or picture, it stores temporarily in the Clipboard All of the listed here File Icon Clipboard All of the listed here File Icon ANSWER DOWNLOAD EXAMIANS APP
Operating System (OS) Which of the following is not a characteristic of a daisy chaining priority control scheme? priority is programmable the number of control lines is independent of the number of devices on the chain None of these it is relatively easy to add more devices to the chain the failure of one device may affect other devices on the chain priority is programmable the number of control lines is independent of the number of devices on the chain None of these it is relatively easy to add more devices to the chain the failure of one device may affect other devices on the chain ANSWER DOWNLOAD EXAMIANS APP
Operating System (OS) You should choose sleep option when You are leaving for a very short time and want to resume you work shortly When computer gets hanged frequently. Let it sleep for some time You finish working and going to bed The computer is tired after working for the whole day You are leaving for a very short time and want to resume you work shortly When computer gets hanged frequently. Let it sleep for some time You finish working and going to bed The computer is tired after working for the whole day ANSWER DOWNLOAD EXAMIANS APP
Operating System (OS) Which of the following are loaded in safe mode ? Keyboard driver All of the listed here Mouse driver VGA drive Keyboard driver All of the listed here Mouse driver VGA drive ANSWER DOWNLOAD EXAMIANS APP
Operating System (OS) Data encryption is mostly used by financial networks None of these is mostly used by public networks cannot be used by private installations is not necessary, since data cannot be intercepted is mostly used by financial networks None of these is mostly used by public networks cannot be used by private installations is not necessary, since data cannot be intercepted ANSWER DOWNLOAD EXAMIANS APP