Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Virtual memory size depends on
[a] address lines [b] data bus
[c] disc space [d] a & c [e] none

Answer Posted / mmh imtiaz

c

Is This Answer Correct ?    9 Yes 3 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Assuming one link of the Trojan horse copy-and-observe-later chain is broken. There are two other possible angles of attack by Alice: Alice logging on and attempting to read the string directly, and alice assigning a security level of sensitive to the back-pocket file. Does the reference monitor prevent these attacks?

2868


What causes a corrupt operating system?

969


What is the most powerful computer in the world 2019?

1009


Explian T - Factor?

1113


How do you restart a crashed laptop?

1048


The flushing policy is described in the subsection on process migration strategies: a) From the perspective of the source, which other strategy does flushing resembles? b) From the perspective of the target, which other strategy does flushing resemble?

2334


How To Lock A User's Account?

1166


What is the difference between the OS which you use and other OSs?

1061


How do I combine multiple folders on a mac?

1005


Who started gnu?

1154


Can yum install rpm?

1092


What is startup repair on my computer?

1007


Give some examples of use of thread in a single user multiprocessing system

6670


Why is my computer so slow?

1061


Directories can be implemented either as "special files" that can only be accessed in limited ways, or as ordinary data files. What are the advantages and disadvantages of each approach?

4539