Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.
Login to our social questions & Answers Engine to ask questions answer people’s questions & connect with other people.
Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
Questions | Answers | Discussions | Knowledge sharing | Communities & more.
In which addressing mode the operand is given explicitly in the instruction?
Immediate mode : In this addressing mode, operand is given explicitly in the instruction.
Immediate mode : In this addressing mode, operand is given explicitly in the instruction.
See lessPoor response times are caused by
Poor response times are usually caused by. Process busy. High I/O rates. High paging rates.
Poor response times are usually caused by. Process busy. High I/O rates. High paging rates.
See lessThe table created by lexical analysis to describe all literals used in the source program, is
The table created by lexical analysis to describe all literals used in the source program is Literal table.
The table created by lexical analysis to describe all literals used in the source program is Literal table.
See less. Feed back queue
Characteristics of Multilevel Feedback Queue Scheduling: Each queue has its own scheduling algorithm, such as First-In-First-Out (FIFO), Round-Robin, or Priority Scheduling. Processes are initially assigned to the highest priority queue, and their priority decreases as they spend more time in the syRead more
Characteristics of Multilevel Feedback Queue Scheduling:
Each queue has its own scheduling algorithm, such as First-In-First-Out (FIFO), Round-Robin, or Priority Scheduling. Processes are initially assigned to the highest priority queue, and their priority decreases as they spend more time in the system.
See lessWhich of the following is characteristic of an operating system?
The Operating systems are different according to the three primary characteristics which are licensing, software compatibility and complexity.
The Operating systems are different according to the three primary characteristics which are licensing, software compatibility and complexity.
See lessLink encryption
Link Encryption is a technique in which a communication traveling along a network is encrypted and decrypted at every stage, or node. It is used to prevent traffic analysis and avoid human error. With link encryption, a communication is encrypted at each node such as devices and network switches.
Link Encryption is a technique in which a communication traveling along a network is encrypted and decrypted at every stage, or node. It is used to prevent traffic analysis and avoid human error. With link encryption, a communication is encrypted at each node such as devices and network switches.
See lessCapacity planning
Capacity planning is a project management process that helps you understand your workforce, tool, and production capacity to meet client demands for projects. It helps you make sure you know exactly what resources need to be available to meet demand effectively.
Capacity planning is a project management process that helps you understand your workforce, tool, and production capacity to meet client demands for projects. It helps you make sure you know exactly what resources need to be available to meet demand effectively.
See lessThe technique, for sharing the time of a computer among several jobs. Which switches jobs so rapidly such that each job appears to have the computer to itself:
The technique, for sharing the time of a computer among several jobs, which switches job so rapidly such that each job appears to love the computer to itself: time out. time sharing.
The technique, for sharing the time of a computer among several jobs, which switches job so rapidly such that each job appears to love the computer to itself: time out. time sharing.
See lessWhich, of the following checks, cannot be carried out on the input data to a system?
Syntax check cannot be carried out on the input data to a system.
Syntax check cannot be carried out on the input data to a system.
See lessThe main function of the dispatcher (the portion of the process scheduler) is
The main function of the dispatcher (the portion of the process scheduler) is: swapping a process to the disk.
The main function of the dispatcher (the portion of the process scheduler) is: swapping a process to the disk.
See less