what is the operating system of mac?3 3937
List reasons why a Mode switch between threads may be cheaper than a Mode switch between processes?2 12333
What is the difference among deadlock avoidance, detection and prevention?3 17973
Discuss some of the reasons for implementing process migration ? How is the process address space handled during process migration?
Write short note on Dynamic memory allocation algorithm.2 6427
can you create con folder in windows, if not why?3 3656
Which file system allow as much fragmentation FAT32 or NTFS?2 6004
if You do not cd drive then how will u format c drive ?5 3994
In the Disk Management for all the drives , "Delete Partition" is in disabled mode ? so plzzz help me to get in enabled mode .4 7615
what is a property sheet?
Explain the process control block of UNIX ?
What items of information about a task might be useful in real time scheduling?
Let us suppose one application needs 2GB RAM to run and dependent plugins will be load while running application. Here My doubt is how many processes will create for this application. I know the concept of virtual memory, which will provide RAM on demand. My straight forward question is what is the size of the process and is it single process will create by operating system to complete the task of my application.??? Thanks in Advance.
What is LOM and how do you access it?
some os have a tree structure file system that limits the depth of a tree and small number of levels.what limit does this have on user? how does this simplify file system design?
absolute path gives the location a file or directory in reference to a rile directory while relative path is a path given file starting from another file. explain?
If you tries to mount a share ( home directory )in a client machine, and it fails how do u approach?
What is the difference among deadlock avoidance, detection and prevention?
if you are using external package for configuring send mail what is the name of the package?
What is direct mount and indirect monut?
how make a bootable dick
when affected the system from virus , which paths will be it stored in system ?
directories can be implemented either special files that can only be accused in limited ways or can be implemented as ordinary data files. what are advantages and disadvantages of this approach?