Question: operating systems CHOSE THE CORECET ANSWER ABOUT OPERATING SYSTEMES Q1: The user authentication procedure belongs to: A. Protection and Security B. Nothing of that C.
operating systems

CHOSE THE CORECET ANSWER ABOUT OPERATING SYSTEMES Q1: The user authentication procedure belongs to: A. Protection and Security B. Nothing of that C. Protection D. Accounting E. Security Q2 The applications typically access to the system call: A. Directly B. Nothing of that C. By requesting the Kernel D. Through the API E. By a special run-time Library Q3 The applications typically access to the system call: A. By requesting the Kernel B. By a special run-time library C. Directly D. Through the API E. Nothing of that af The Cloud Computing is consisted of: A. Cloud computing management tools. * B. VMM: Virtual Machine Manager. Traditional ski Line and MS Windows D. all above E. Nothing of that. 25 the general principle which determines how to do build something in details to serve the general goal. It is called: A. All of that B. Policy C. system software D. Software engineering. E. mechanism The crushes and major failures which happen in user-mode. They are called: A. Crash dump B. Nothing of that C. Core dump D. User-mode dump E. Tracing dump Q7When an error happened, the operating system handling A. All of that B. Depends on the user id who ist C. Nothing of that D. Depends on the time and where it happened E. Depends on the error type 08: The applications typically access to the system call: A. By requesting the Kernel B. By a special run-time library C. Directly D. Through the API E. Nothing of that Q How many sets of services are provided by operating system? A. Two sets to help users and the system itself */ B. Just one./ C. One set to help the users Q.10 Searching, finding and fixing the mistakes or errors. It is called: A. Debugging B. Profiling c. Log files D. All of that E. Tracing
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
