A. Destroyed blocks, partitioning
B. Bad blocks, low level formatting
C. Destroyed blocks, high level formatting
D. Bad blocks, partitioning
A. Principle of least privilege
B. Principle of process scheduling
C. Principle of operating system
D. None of the mentioned
A. Zone based operating system
B. Level based operating system
C. Network operating system
D. All of the mentioned
A. Virtual Memory
B. Non-contiguous Memory Allocation
C. No effective technique
D. None of these
A. There is a lot of cost involved
B. Time consumption overhead
C. Absence of memory protection between processes
D. Restricted access to memory locations by processes
A. Is same as any other regular file
B. Must be accessed at specific rate
C. Stored on remote server can not be delivered to its client
D. None of the mentioned
A. Operating system
B. Kernel
C. Software
D. Hardware
Explanation: The operating system is software which provides a buffer between the low-level interfaces to the hardware within the system and the user.
A. Port 35
B. Port 63
C. Port 25
D. Port 65
Explanation: The server would have to listen on port 25 for the simple mail transfer protocol.