Home
Current Affairs January 2024

What is the correct answer?

4

A _______________in a distributed system is a string of bits or characters that is used to refer to an entity.

A. name

B. attribute

C. identifiers

D. addresses

Correct Answer :

A. name


Related Questions

What is the correct answer?

4

A solution to starvation is _____________.

A. segmentation

B. Aging

C. Paging

D. virtual memory

What is the correct answer?

4

A program to be executed must be in ---------------

A. main memory

B. secondary memory

C. virtual memory

D. Read only memory

What is the correct answer?

4

When you start up the computer the boot up storage at which the BIOS versions manufacturer and data are displayed on the monitor is called

A. Bootstrap

B. System configuration

C. Power on self test (POST)

D. Kernel loading

What is the correct answer?

4

RPN stands for

A. Reverse Polish Notation

B. Record Police Notation

C. Record Polish Notation

D. Reverse Police Negation

What is the correct answer?

4

The maximum size of a write file is limited to only

A. Name of the file

B. Extension of the file

C. The amount of memory in your computer

D. All of above

What is the correct answer?

4

A _______________in a distributed system is a string of bits or characters that is used to refer to an entity.

A. name

B. attribute

C. identifiers

D. addresses

What is the correct answer?

4

______________ is a situation in which two computer programs sharing the same resource are effectively preventing each other from accessing the resource, resulting in both programs ceasing to function.

A. Semaphore

B. Deadlock

C. Mutual Exclusion

D. No preemption

What is the correct answer?

4

Choose the correct statement from the following.

A. In computer terminology, variables are symbols which stand for some value.

B. An alternative method for executing the commands in the file backup is to make the file as directory.

C. The restricted shell gives more control to the system administrator and restricts the options of the user.

D. The decision making done by computer programs is in the form of conditional execution.

What is the correct answer?

4

Process migration involves__________________

A. Selection of a process to be migrated

B. Selection of destination system or node

C. Actual transfer of the selected process to the destination system or node

D. All A, B, C

What is the correct answer?

4

___________variable is not automatically created on all UNIX systems but is used by so many programs that it is considered a standard environment variable.

A. IFS

B. MAIL

C. TERM

D. PATH

What is the correct answer?

4

Pick the wrong statement from the following.

A. UNIX systems originally came with a command interpreter called the Bourne Shell.

B. The cat command takes any characters from standard input, and then echoes them to standard output.

C. A pipe is a means of taking the output of one command and directing it as another command.

D. The manual entry is called a man page, even though it is often more than one page long.

What is the correct answer?

4

To install the new font

A. Start -> setting -> font

B. Start -> control panel -> font -> install new font

C. Start -> setting -> control panel -> font -> install new font

D. Start -> setting -> control panel -> font

What is the correct answer?

4

The essential difference between an operating system like Linux and one like Windows is that

A. Linux is a proprietary whereas Windows is not

B. Windows can run with an Intel processor, whereas Linux cannot

C. There are multiple versions of Linux, but only one version of Windows

D. Any programmer can modify Linux code which is not permitted with Windows

What is the correct answer?

4

In MS-DOS, the interfaces and levels of functionality are _______________

A. not well separated.

B. well separated

C. independent

D. dependent

What is the correct answer?

4

Which components appear in the initial windows start up display?

A. Dialog box

B. Task bar

C. Start menu

D. All of the above

What is the correct answer?

4

The ______________ unpacks the call receipt messages from local RPC Runtime and makes a perfect local call to invoke the appropriate procedure in the server.

A. server Stub

B. server

C. client

D. client stub

What is the correct answer?

4

BSD stands for_____________________

A. Basic Software Division

B. Berkeley Software Distribution

C. British Software Distribution

D. Berkeley Software data

What is the correct answer?

4

Bootstrapping is also known as ______

A. cold-hot boot

B. hot boot

C. hot strap

D. cold boot

What is the correct answer?

4

Which command is used to display the contents of the text file of DOS?

A. Copy

B. Copy con

C. Dir

D. Type

What is the correct answer?

4

______________approach simplifies debugging and system verification.

A. Kernel

B. Layered

C. Extended

D. Virtual machine

What is the correct answer?

4

A process is ____________________

A. A program in Execution.

B. An asynchronous activity.

C. The 'dispatchable' unit.

D. All A, B, C

What is the correct answer?

4

______________ refers to the technology in which some space in hard disk is used as an extension of main memory.

A. Cache memory

B. Paging

C. Virtual memory

D. Associative memory

What is the correct answer?

4

The _________takes any characters from standard input, and then echoes them to standard output.

A. kill character

B. cat command

C. cate command

D. control command

What is the correct answer?

4

A process is already split into pieces, called________________.

A. Tasks

B. Program

C. Processors

D. Routines

What is the correct answer?

4

In ________________________ each node periodically sends a message to the time server.

A. Passive Time Server Centralized Algorithm

B. Active Time Server Centralized Algorithm

C. Global Averaging Distributed Algorithms

D. Localized Averaging Distributed Algorithms

What is the correct answer?

4

Which of the following is drop down list?

A. Combo box

B. List

C. Text area

D. None

What is the correct answer?

4

_______________occurs when two or more execution flows are able to run simultaneously.

A. Deadlock

B. Concurrency

C. race condition

D. interrupt

What is the correct answer?

4

______________is responsible for allocating primary memory to processes and for assisting the programmer in loading and storing the contents of the primary memory.

A. Operating system

B. Memory manager

C. Database administrator

D. RAM

What is the correct answer?

4

Wiretapping to capture data in a network is an example of ________________

A. interruption

B. interception

C. fabrication

D. modification

What is the correct answer?

4

__ is the program run on a computer when the computer boots up

A. System software

B. Operating system

C. System operations

D. None