Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Virtual memory size depends on
[a] address lines [b] data bus
[c] disc space [d] a & c [e] none

Answer Posted / xx

a

Is This Answer Correct ?    36 Yes 5 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Explian T - Factor?

1115


Can we compare two files in notepad ++?

1013


What is the latest android operating system?

1046


What Command To Restore Backup Of Non - Rootvg?

1221


What Command To Take Backup Other Vg's?

1086


What is the most powerful processor?

1058


Is the g in gnu silent?

997


Explain the term shell.

1066


Do simultaneous downloads take longer?

1001


Assuming one link of the Trojan horse copy-and-observe-later chain is broken. There are two other possible angles of attack by Alice: Alice logging on and attempting to read the string directly, and alice assigning a security level of sensitive to the back-pocket file. Does the reference monitor prevent these attacks?

2868


What is the best free operating system?

1053


What happens if you turn off computer during update?

940


Can I put an ssd in my old computer?

1044


Is microsoft coming out with a new operating system?

949


Difference Between Jfs & Jfs2?

1084