Operating System (OS) What problem is solved by Dijkstra's banker's algorithm? mutual exclusion None of these cache coherence deadlock recovery deadlock avoidance mutual exclusion None of these cache coherence deadlock recovery deadlock avoidance ANSWER DOWNLOAD EXAMIANS APP
Operating System (OS) The strategy of allowing processes that are logically runnable to be temporarily suspended is called non preemptive scheduling first come first served preemptive scheduling shortest job first None of these non preemptive scheduling first come first served preemptive scheduling shortest job first None of these ANSWER DOWNLOAD EXAMIANS APP
Operating System (OS) Which mode loads minimal set of drivers when starting Windows? Normal Mode Network Support Mode VGA Mode Safe Mode Normal Mode Network Support Mode VGA Mode Safe Mode ANSWER DOWNLOAD EXAMIANS APP
Operating System (OS) The computational technique used to compute the disk storage address of individual records is called: bubble memory hashing key fielding dynamic reallocation None of these bubble memory hashing key fielding dynamic reallocation None of these ANSWER DOWNLOAD EXAMIANS APP
Operating System (OS) The function(s) of the Storage Assignment is (are) to assign storage to all temporary locations that are necessary for intermediate results. to assign storage to all variables referenced in the source program. All of these None of these to assign storage to literals, and to ensure that the storage is allocate and appropriate locations are initialized. to assign storage to all temporary locations that are necessary for intermediate results. to assign storage to all variables referenced in the source program. All of these None of these to assign storage to literals, and to ensure that the storage is allocate and appropriate locations are initialized. ANSWER DOWNLOAD EXAMIANS APP
Operating System (OS) The most common security failure is carelessness by users None of these too much emphasis on preventing physical access insufficient technology used to prevent breaches depending on passwords carelessness by users None of these too much emphasis on preventing physical access insufficient technology used to prevent breaches depending on passwords ANSWER DOWNLOAD EXAMIANS APP