adplus-dvertising
frame-decoration

Question

The working set theory of programming behaviour of processes running within an operating system involves

a.

the collection of pages that a process accesses

b.

disk scheduling mechanisms

c.

coalescing holes in memory

d.

assigning the CPU to processes

Posted under Operating System

Answer: (a).the collection of pages that a process accesses

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. The working set theory of programming behaviour of processes running within an operating system involves

Similar Questions

Discover Related MCQs

Q. A disk scheduling algorithm in an operating system causes the disk arm to move back and forth across the disk surface in order to service all requests in its path. This is a

Q. When a client has a cascading mount, _______ server(s) is/are involved in a path name traversal.

Q. For every pair of component and directory vnode after path name translation :

Q. _______________ in NFS involves the parsing of a path name into seperate directory entries – or components.

Q. The NFS protocol, __________ concurrency control mechanisms.

Q. A single NFS write procedure :

Q. The server must write all NFS data ___________

Q. A server crash and recovery will __________ to a client.

Q. Every NFS request has a _________ allowing the server to determine if a request is duplicated or if any are missing.

Q. The NFS servers :

Q. In UNIX, the file handle consists of a __________ and __________

Q. The server maintains a/an ________ that specifies local file systems that it exports for mounting, along with names of machines that are permitted to mount them.

Q. The mount request is mapped to the corresponding _____ and is forwarded to the mount server running on the specific server machine.

Q. A mount operation includes the :

Q. The mount mechanism ________ a transitive property.

Q. ___________ mounts, is when a file system can be mounted over another file system, that is remotely mounted, not local.

Q. The _________ becomes the name of the root of the newly mounted directory.

Q. A machine in Network file system (NFS) can be ________

Q. All the changes that were done from a transaction that did not commit before the system crashed, have to be _________

Q. A circular buffer :