Question: operating systems CHOSE THE CORECET ANSWER ABOUT OPERATING SYSTEMES Q1: The user authentication procedure belongs to: A. Protection and Security B. Nothing of that C.

operating systems

operating systems CHOSE THE CORECET ANSWER ABOUT OPERATING SYSTEMES Q1: The user

CHOSE THE CORECET ANSWER ABOUT OPERATING SYSTEMES Q1: The user authentication procedure belongs to: A. Protection and Security B. Nothing of that C. Protection D. Accounting E. Security Q2 The applications typically access to the system call: A. Directly B. Nothing of that C. By requesting the Kernel D. Through the API E. By a special run-time Library Q3 The applications typically access to the system call: A. By requesting the Kernel B. By a special run-time library C. Directly D. Through the API E. Nothing of that af The Cloud Computing is consisted of: A. Cloud computing management tools. * B. VMM: Virtual Machine Manager. Traditional ski Line and MS Windows D. all above E. Nothing of that. 25 the general principle which determines how to do build something in details to serve the general goal. It is called: A. All of that B. Policy C. system software D. Software engineering. E. mechanism The crushes and major failures which happen in user-mode. They are called: A. Crash dump B. Nothing of that C. Core dump D. User-mode dump E. Tracing dump Q7When an error happened, the operating system handling A. All of that B. Depends on the user id who ist C. Nothing of that D. Depends on the time and where it happened E. Depends on the error type 08: The applications typically access to the system call: A. By requesting the Kernel B. By a special run-time library C. Directly D. Through the API E. Nothing of that Q How many sets of services are provided by operating system? A. Two sets to help users and the system itself */ B. Just one./ C. One set to help the users Q.10 Searching, finding and fixing the mistakes or errors. It is called: A. Debugging B. Profiling c. Log files D. All of that E. Tracing

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!