Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


how to find turn around time in operating system?

Answers were Sorted based on User's Feedback



how to find turn around time in operating system?..

Answer / guest

Mean time from submission to completion of process.

Is This Answer Correct ?    22 Yes 3 No

how to find turn around time in operating system?..

Answer / hemal patel ( b.c.a )

The Interval from the time of submission of a process to the
time of completion is the TURN AROUND time

Is This Answer Correct ?    11 Yes 1 No

how to find turn around time in operating system?..

Answer / ehsan

The time between sending and receiving the data,

Is This Answer Correct ?    5 Yes 0 No

Post New Answer

More C Interview Questions

How can I manipulate strings of multibyte characters?

0 Answers  


Write a program to print “hello world” without using semicolon?

0 Answers  


Why should I use standard library functions instead of writing my own?

0 Answers  


What is the equivalent code of the following statement in WHILE LOOP format?

0 Answers  


a way in which a pointer stores the address of a pointer which stores the value of the target value a) reference b) allocation c) multiple indirection d) none

0 Answers  


explain what is fifo?

0 Answers  


In cryptography, you could often break the algorithm if you know what was the original (plain) text that was encoded into the current ciphertext. This is called the plain text attack. In this simple problem, we illustrate the plain text attack on a simple substitution cipher encryption, where you know each letter has been substituted with a different letter from the alphabet but you don’t know what that letter is. You are given the cipherText as the input string to the function getwordSets(). You know that a plain text "AMMUNITION" occurs somewhere in this cipher text. Now, you have to find out which sets of characters corresponds to the encrypted form of the "AMMUNITION". You can assume that the encryption follows simple substitution only. [Hint: You could use the pattern in the "AMMUNITION" like MM occurring twice together to identify this]

0 Answers   Infosys,


There are 3 baskets of fruits with worng lables,one basket has apple,another basket has orange,another has combination of apple and orange,what is the least way of interchange the lables.

15 Answers   Cisco, Google, MBT,


Explain what is the benefit of using const for declaring constants?

0 Answers  


What does %2f mean in c?

0 Answers  


What are two dimensional arrays alternatively called as?

0 Answers  


what is available in C language but not in C++?

10 Answers   CTS, TCS,


Categories