Windows Operating System
Description: Windows Operating System Operating Systems with Case Study of UnixOperating SystemOperating System | |
Number of Questions: 25 | |
Created by: Aliensbrain Bot | |
Tags: Windows Operating System Operating Systems with Case Study of Unix Operating System |
Which of the following systems is a combination of processors and special softwares that is inside another device such as the electronic ignition system in cars?
Which of the following executive subsystems translates user mode read and write commands in read or write IRPs which it passes to device drivers?
Which of the following disk storages is a striped volume that stores all its data across several disks in stripes?
In which of the following techniques, the virtual machine simulates the complete hardware, allowing an unmodified operating system for a completely different CPU to run in the virtual machine?
Which of the following security bulletins issues with a vulnerability in the part of RPC that deals with message exchange over TCP/IP?
Which of the following executive subsystems determines whether an object or resources can be accessed via the use of access control list?
Which of the following utilities are a group of keyboard related support for people with typing issues and tells the keyboard to ignore repeated keystrokes?
In which of the following types of disk storage, if one disk fails then the data can be totally recovered from the other disk?
In which of the following techniques, the virtual machine only partially simulates enough hardware to allow an unmodified operating system to be run in isolation?
In which of the following utilities designed to make the system more accessible, windows is told to disregard keystrokes that are not held down for a certain time period?
Which of the following security bulletins issues the particular vulnerability, affects the RPC endpoint mapper process which listens on TCP/IP port 135?
Which of the following systems is a group of computers that work together closely so that in many respects they can be viewed as though they are a single computer?
Which of the following executive subsystems manages the communication between the environment subsystem and components of the executives?
Which of the following utilities are used to allow multiple keystrokes to one key, to be ignored within a certain time frame?
Which of the following security bulletins issues newly identified vulnerabilities in the part of RPCSS services that deals with RPC messages for DCOM activation?
Which of the following utilities are designed to make the system more accessible and give Windows 2000 the ability to support speech augmentation devices?
Which of the following executive subsystems controls the paging of memory in and out of the physical memory to the disk storage?
Which of the following modes is made up of subsystems that can pass I/O requests to the appropriate kernel mode drivers via the I/O manager?
Which of the following executive subsystems is a special executive subsystem that all the other executive subsystems must pass through to gain access to Windows 2000 resources?
Which of the following utilities is designed to make the system more accessible to assist the users with visual impairments with system messages?
Which of the following executive subsystems handles plug and play and supports device detection and installation at boot time?
Which of the following executive subsystems controls the way that output is painted to the screen and handles input events?
Which of the following types of disk storage consists of multiple disks and uses block level striping with parity data distributed across all member disks?
In which of the following security bulletins, several of the RPC servers associated with system services in Microsoft exchange server and SQL server do not adequately validate inputs?
In which of the following utilities designed to make the system more accessible, a user can press the modifier key and release that key and then press the combination key?