Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

which one of following is not memory management model?
choices are buddy system, monitors, paging, swapping

Answer Posted / auradi

Paging and Swappings are two methods in which they r used
as removing the Fragmentation.

Where as Buddy System I dont Know about Them. But
Monitor is the one which is not used for Memory Management
purpose.

Is This Answer Correct ?    5 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

How do I free up disk space?

995


Assuming feedback to the adversary flugging an error as each incorrect character is entered, what is the expected time to discover the correct password?

3312


How do I compare files in notepad ++?

971


What is microsoft spreadsheet compare?

976


How do I upgrade my operating system?

999


Assuming one link of the Trojan horse copy-and-observe-later chain is broken. There are two other possible angles of attack by Alice: Alice logging on and attempting to read the string directly, and alice assigning a security level of sensitive to the back-pocket file. Does the reference monitor prevent these attacks?

2818


What are compile time Errors?

1104


What is difference between kernel and os?

1049


What is the most powerful processor?

1009


How do I run wget?

962


How do you remove a virus from your computer?

977


The flushing policy is described in the subsection on process migration strategies: a) From the perspective of the source, which other strategy does flushing resembles? b) From the perspective of the target, which other strategy does flushing resemble?

2282


Why does kernel panic occur?

974


Can we compare two files in notepad ++?

961


Will disk cleanup delete my files?

914