Question
a.
files
b.
boot sector
c.
memory
d.
all of the mentioned
Posted under Operating System
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Multipartite viruses attack on
Similar Questions
Discover Related MCQs
Q. In asymmetric encryption
View solution
Q. What is true regarding ‘Fence’ ?
View solution
Q. What is not true regarding ‘Fence’ ?
View solution
Q. What is correct regarding ‘relocation’ w.r.t protecting memory ?
View solution
Q. How can fence and relocation be used together ?
View solution
Q. What is basic need in protecting memory in multi-user environment ?
View solution
Q. What is role of base/bound registers ?
View solution
Q. What is all-or-nothing situation for sharing in memory ?
View solution
Q. How is disadvantage of all-or-nothing approach overcome ?
View solution
Q. What is true regarding tagged architecture ?
View solution
Q. What is best solution to have effect of unbounded number if base/bound registers?
View solution
Q. What is major feature of segmentation ?
View solution
Q. What is correct way the segmentation program address is stored ?
View solution
Q. What is main objective of protection ?
View solution
Q. What is principle of least privilege ?
View solution
Q. What is need of protection ?
View solution
Q. What is incorrect methods of revocation of access rights ?
View solution
Q. Why is it difficult to revoke capabilities ?
View solution
Q. What is reaquisition scheme to revoke capability ?
View solution
Q. What is false regarding Back-Pointers scheme to revoke capability ?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Operating System? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!