Which of following is used for back-up files?
(a) compress (b) Tar (c) make (d) all the above
In the process table entry for the kernel process, the process id value is a) 0 b) 1 c) 2 d) 255 e) it does not have a process table entry
4 Answers Aspire, IBM, Saigun Technologies,
Can you turn on a computer with the keyboard?
What operating systems provide threads?
Directories can be implemented either as "special files" that can only be accessed in limited ways, or as ordinary data files. What are the advantages and disadvantages of each approach?
Why is my computer so slow?
Can you just explain about memory management in iOS?
describe the situation in which priority inversion can occur
i want information about real time operating systems because i have an interview tomoorow in valeo company.
How do I upgrade my operating system?
How do you reset your computer?
Assuming one link of the Trojan horse copy-and-observe-later chain is broken. There are two other possible angles of attack by Alice: Alice logging on and attempting to read the string directly, and alice assigning a security level of sensitive to the back-pocket file. Does the reference monitor prevent these attacks?
If semaphore variable is 8 after 6 wait operations and 3 signal operations.what is semaphore