describe my computer and my documents folders. identify the elements that are present in every window.
i want placement papers of GAMELOFT software company and the information regarding windows operating system and MS-office questions
in a direct memory access how does the CPU know when the memory operation are complete
list TWO problems that force some operating system to use the technique of device dedication
in a multiprogramming and time-sharing environment,several user share the system simultaneously. this situation can result in various security problems a.discuss two such problems b.how can we ensure the same degree of security in a time-share machine as in a dedicated machine?
describe a typical multiple-level priority-base scheduling and give FIVE examples of factors that can be implemented on the different levels
state and explain FIVE basic disk-based file system operation
explain the need for a directory tree and how it is used
describe the problem of race condition in an operating system and discuss TWO methods of addressing it
what kind of operating(s)systems would be needed (and explain why) in an environment where there exist various cluster of networks which are all interconnected in different geographical areas with strong emphasis on online applicating process.
Assuming feedback to the adversary flugging an error as each incorrect character is entered, what is the expected time to discover the correct password?
Assuming one link of the Trojan horse copy-and-observe-later chain is broken. There are two other possible angles of attack by Alice: Alice logging on and attempting to read the string directly, and alice assigning a security level of sensitive to the back-pocket file. Does the reference monitor prevent these attacks?
The flushing policy is described in the subsection on process migration strategies: a) From the perspective of the source, which other strategy does flushing resembles? b) From the perspective of the target, which other strategy does flushing resemble?
Directories can be implemented either as "special files" that can only be accessed in limited ways, or as ordinary data files. What are the advantages and disadvantages of each approach?
In the token-passing mutual exclusion algorithm, is the timestamping used to reset clocks and correct drifts, as in the distributed queue algorithms? if not, what is the function of the timestamping?