What types of operating systems let more than one user  access the same resources at the same time?

1 Answer

Answer :

Multiuser/multitasking.

Related questions

Description : Which types of operating systems are the simplest and most common on microcomputers?

Last Answer : Single user/single tasking.

Description : My ipod won't let me access my mail? It says "The user name or password for "imap.apple.yahoo.com" is incorrect" and I know my password and username are both correct.

Last Answer : you should try the apple support forums.

Description : Which statement is true about a cloud computing environment? A. It cannot be used to host location based applications. B. It enables users to access systems regardless of their location. C. It introduces ... D. It can improve a web server response time by having servers closer to the end user.

Last Answer : It enables users to access systems regardless of their location.

Description : The following three golden rules: (i) Place the user in control (ii) Reduce the user’s memory load (iii) Make the interface consistent are for (A) User satisfaction (B) Good interface design (C) Saving system’s resources (D) None of these

Last Answer : (B) Good interface design 

Description : What is Onion diagram illustrates? a) It illustrates the connection between the layers in communications protocols, such as the International Standards Organization Open Systems Interconnection (ISO OSI) model,or the ... with the kernel at the core c) All of the mentioned d) None of the mentioned

Last Answer : None of the mentioned

Description : LEDs operating at 850 nm provide sufficient optical power for short-distance, low-bandwidth multimode systems. List three conditions that prevent the use of LEDs in longer distance, higher bandwidth multimode systems.

Last Answer : Multimode fiber dispersion, the relatively high fiber attenuation, and the LED's relatively low optical output power.

Description : What term is used for programs such as assemblers, compilers, and operating systems?

Last Answer : Software.

Description : Point out the wrong statement : A. Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through ... A process virtual machine instantiates when a command begins a process D. All of the above

Last Answer : Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through that host VM

Description : Point out the wrong statement : A. Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through ... A process virtual machine instantiates when a command begins a process D. All of the above

Last Answer : Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through that host VM

Description : Point out the wrong statement. a) Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware ... A process virtual machine instantiates when a command begins a process d) All of the mentioned

Last Answer : Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through that host VM

Description : Why do most operating systems let users make systems changes?

Last Answer : I dont

Description : Which is not a benefit of virtualization? a) Flexible and efficient allocation of resources b) Lowers the cost of IT infrastructure c) Remote access and rapid scalability d) Run on single operating system

Last Answer : Run on single operating system

Description : means to prove the identity of the entity that tries to access the system's resources.

Last Answer : Entity authentication

Description : Briefly explain the difference between Public (public), Friend (internal), and Private (private) access levels as they apply to user-defined types and members.

Last Answer : In user-defined types, Public (public) classes can be instantiated by any element of the application. Friend (internal) classes can be instantiated only by members of the same assembly, and Private ( ... the same assembly, and Private (private) members can be accessed only from within the type. 

Description : Point out the correct statement. a) Platforms cannot be based on specific types of development languages, application frameworks, or other constructs b) PaaS systems offer a way to create user ... customers may interact with the software to enter and retrieve data d) All of the mentioned

Last Answer : PaaS systems offer a way to create user interfaces

Description : Random-access storage media refers to what types of storage

Last Answer : Magnetic core, semiconductor, thin film, and bubble.

Description : Which types of LEDs are the preferred optical sources for short-distance, low-data-rate fiber optic systems?

Last Answer : SLEDs and ELEDs.

Description : What are the two basic types of tape buffering reeling systems?

Last Answer : a. Spring-tension buffering systems. b. Vacuum-column buffering systems.

Description : What are four types of tape errors that can degrade a magnetic recording system’s performance?

Last Answer : Signal dropout, noise, skew, and level. Dropout is the most common.

Description : Which factor determines who has the right to access different types of IT systems and information? a. Availability b. Accessibility c. Reliability d. Scalability

Last Answer : b. Accessibility

Description : 8. Nslookup can be used to gather information regarding which of the following? A. Host names and IP addresses B. Whois information C. DNS server locations D. Name server types and operating systems

Last Answer : A. Host names and IP addresses

Description : The work center supervisor can update what items from a user terminal?

Last Answer : COSAL, APL, EIC, SHIP'S FORCE WORK LIST, and CSMP.

Description : What does user friendly mean in computer terms?

Last Answer : Operating instructions are written in everyday English

Description : Maintenance performed by the user activity is what maintenance level?

Last Answer : Organizational.

Description : Let the time taken to switch between user mode and kernel mode of execution be T1 while time taken to switch between two user processes be T2. Which of the following is correct? (A) T1 < T2 (B) T1 > T2 (C) T1 = T2 (D) Nothing can be said about the relation between T1 and T2.

Last Answer : (A) T1 < T2

Description : The need for assurance services arises because: a. There is a potential bias in providing information. b. Economic transactions are less complex than they were a decade ago. c. There is a consonance ... . d. Most users today have access to the system that generates the financial statements they use

Last Answer : There is a potential bias in providing information

Description : Is a special tablet that is designed to let the user read books magazines and other publications.?

Last Answer : What is the answer ?

Description : Are webpages presented in exactly the same way across different operating systems web browsers?

Last Answer : Need answer

Description : The principle of time sharing is 1) large numbers of users direct access to the computer for problem solving 2) large number of user for file sharing 3) both of above 4) none

Last Answer : large numbers of users direct access to the computer for problem solving

Description : The principle of time sharing is 1) large numbers of users direct access to the computer for problem solving 2) large number of user for file sharing 3) both of above 4) none

Last Answer : 1) large numbers of users direct access to the computer for problem solving

Description : The principle of time sharing is 1 large numbers of users direct access to the computer for problem solving 2 large number of user for file sharing 3 both of above 4 none

Last Answer : 1 large numbers of users direct access to the computer for problem solving

Description : Change X requires a higher level of authority than Change Y in which of the following pairs? Change X Change Y A. Code in development Code in production B. Specifications during requirements ... Documents requested by customers D. A product distributed to several sites A product with a single user

Last Answer : D. A product distributed to several sites A product with a single user

Description : Allocation of a resources in a time dependent fashion to several program simultaneously called 1) multi tasking 2) multi user 3) time sharing 4) None

Last Answer : 3) time sharing

Description : Allocation of a resources in a time dependent fashion to several program simultaneously called 1 multi tasking 2 multi user 3 time sharing 4 None

Last Answer : 3 time sharing

Description : A machine that connects to two or more electronic mail systems and transfers mail messagesamong them is known as A. Gateways B. mail gateway C. bridges D. User Agent E. None of the above

Last Answer : mail gateway

Description : The reasons leading to popularity of client-server systems are: A) More powerful workstations on LANs B) Needed for graphical user interfaces of end users. C) Remove computing load for presentation services from the system managing a shared database resource. D) All

Last Answer : D) All

Description : The UNIX operating system is suitable for (1) Multi user (2) Real-Time Processing (3) Distributed Processing (4) Single user

Last Answer : Multi user

Description : The ‘IBM-DOS’ is a (1) Single user operating system (2) Multiuser operating system (3) Batch operating system (4) Time-sharing operating system

Last Answer : Single user operating system

Description : The UNIX operating system is suitable for : (1) Multi user (2) Real-Time Processing (3) Distributed Processing (4) Single user

Last Answer : Multi user

Description : What happens to the fundamental mode as the operating wavelength becomes longer than the single mode cutoff wavelength?

Last Answer : The fundamental mode becomes increasingly lossy.

Description : Scattering losses are caused by the interaction of light with density fluctuations within a fiber. What are the two scattering mechanisms called when the size of the density fluctuations is (a) greater than and (b) less than one-tenth of the operating wavelength?

Last Answer : . (a) Mie scattering; (b) Rayleigh scattering.

Description : Mac question: Best steps for manually erasing user data if I don't have access to an install CD?

Last Answer : So far I’ve manually Secure-deleted the following: all my user docs, my keychains, and anything in application support that would have stored sensitive info (like my Firefox data and Mail directory). What else should I delete?

Description : How can I create a new user that can only access a single directory with FTP on Ubuntu?

Last Answer : answer:I'm not sure what your needs are, but I had a similar situation where I needed someone to be able to move files to/from my server. It turned out that it was a lot easier for me to use ... https://www.dropbox.com/install?os=lnx I don't use ftp, but google is suggesting proftpd when I search.

Description : Which ports needs to be open in order for a user to access the internet?

Last Answer : I believe that the concept of "open ports" applies on the serverside; meaning that the server will respond on certain ports. Sobasically, you need none on the side of the end-user.

Description : Where can I access a free online user manual for a T-Mobile myTouch?

Last Answer : Most cell phones come with a free user guide in the form of a pamphlet. If you are looking for an online version, the T-Mobile website offers a free version.

Description : Where can I access a free online user manual for a T-Mobile G2x with Google?

Last Answer : All owener's manuals should be accessible through the phone manufacturer's website. Use a desktop/laptop (not mobile device) to search the website for your specfic manual. The manual's usually pop ... or update your Adobe reader.(http://cache.g2.t-mobile.com/files/T-Mobile_G2_User_Guide.pdf)

Description : Where can I access a free online user manual for a Sharp FX?

Last Answer : You can download your free online Sharp FX manual at www.manualusersguide.com. They will tell you everything about the phone from how much it weighs to operating and wi-fi.

Description : A computer checks the _____ of user names and passwords for 9 a match before granting access. 1) Website 2) Network 3) Backup file 4) Data base 5) None of these

Last Answer : Answer :4

Description : The user generally applies _________ to access mainframe or super computer? (A) node (B) terminal (C) desktop (D) None of the Above

Last Answer : (B) terminal

Description : What is not a role of encryption? a)It is used to protect data from unauthorized access during transmission. b)It is used to ensure user authentication c)It is used to ensure data integrity d)It is used to ensure data corruption does not happens

Last Answer : d)It is used to ensure data corruption does not happens