Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Virtual memory size depends on
[a] address lines [b] data bus
[c] disc space [d] a & c [e] none

Answer Posted / xx

a

Is This Answer Correct ?    36 Yes 5 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Where do I find disk cleanup?

918


Is kernel a os?

890


Explain about memory management in operating system.

988


How do you fix a crashed computer?

958


Give some examples of use of thread in a single user multiprocessing system

6594


why we make plex offline online in vxvm?

2865


How do I compare plugins in notepad ++?

949


How do you remove a virus from your computer?

936


What is concurrency go?

969


Which processor is better amd or intel?

995


How do you reset your computer?

1061


How do I change my local disk?

916


Assuming one link of the Trojan horse copy-and-observe-later chain is broken. There are two other possible angles of attack by Alice: Alice logging on and attempting to read the string directly, and alice assigning a security level of sensitive to the back-pocket file. Does the reference monitor prevent these attacks?

2764


What do you know about the latest android version Lollipop?

914


What is difference between post and put method?

1009