The more privileged mode is often referred as_______________
The more privileged mode is often referred as_______________
When the operating system creates a process at the request of the explicit request of another process the action is referred to as________________
When the operating system creates a process at the request of the explicit request of another process the action is referred to as________________
Memory tables are used to keep the track of ______________
Memory tables are used to keep the track of ______________
Operating system's fundamental responsibility is to control the ________________
Operating system's fundamental responsibility is to control the ________________
A listing the sequence of instructions that execute the process is referred as a ________________
A listing the sequence of instructions that execute the process is referred as a ________________
When a new process is to be added is referred as ___________
When a new process is to be added is referred as ___________
When a new process is created to execute a program this event is called as ___________
When a new process is created to execute a program this event is called as ___________
In Computer systems authentication is the fundamental building block in_______________
In Computer systems authentication is the fundamental building block in_______________
Program code is an essential element of the_______________
Program code is an essential element of the_______________
Process control block (PCB) is the most important_______________
Process control block (PCB) is the most important_______________
The user level context contains the basic elements of _______________
The user level context contains the basic elements of _______________
File tables provide information about the existence of _______________
File tables provide information about the existence of _______________
UNIX employs two running states to indicate whether the process is______________
UNIX employs two running states to indicate whether the process is______________
Data collection created by a user is called ______________
Data collection created by a user is called ______________
Context data are data present in register in the processor while the process is_______________
Context data are data present in register in the processor while the process is_______________
Program counter is the address of the next instruction in the program to be ____________
Program counter is the address of the next instruction in the program to be ____________
When a program is loaded into the memory it is called as________________
When a program is loaded into the memory it is called as________________
Process control information is the additional information needed by the ________________
Process control information is the additional information needed by the ________________
Memory pointers includes ____________
Memory pointers includes ____________
Process location tells about the location of_______________
Process location tells about the location of_______________