(A) To deadlock recovery
(B) To prevent deadlock
(C) To solve the deadlock
(D) None of the above
Author:
Which of the following technique is used to convert a blocking system call into a non blocking system call?
(A) Fragmentation
(B) Jacketing
(C) Segmentation
(D) None of the above
It holds the address of the next instruction to be executed?
(A) Status register
(B) Stack register
(C) Program counter
(D) Accumulator
It is a technique used to speed up communication with slow devices?
(A) Caching
(B) Segmentation
(C) Fragmentation
(D) None of the above
It is the process of switching of CPU from one thread to another?
(A) Interrupt handling
(B) Process handling
(C) Context switching
(D) None of the above
Secure shell SSH network protocol is used for?
(A) Remote command line login
(B) Secure data communication
(C) Remote command execution
(D) All of the above
Layer 2 switch is also called?
(A) Multiport switch
(B) Multiport hub
(C) Multiport bridge
(D) Multiport NIC