Related Questions
What is the correct answer?
4
Initialization of I/O devices is part of the_________.
What is the correct answer?
4
Fsck conducts a check in _____ phases
What is the correct answer?
4
A standard UNIX system includes a set of ___________ and a set of ___________.
B. Libraries, Applications
What is the correct answer?
4
Which of the following is drop down list?
What is the correct answer?
4
_________, as a feature of good distributed file system, clients should be able to continue working if a file server crashes. Likewise, data must not be lost and a restarted file server must be able to recover to a valid state.
What is the correct answer?
4
Which is the layer of a computer system between the hardware and the user program
What is the correct answer?
4
When copying more than one file at a time, you must specify an existing directory as the ___________
What is the correct answer?
4
IPC stands for _________
A. Integrated parallel communication
B. Intermediate process call
D. Inter process communication
What is the correct answer?
4
The essential difference between an operating system like Linux and one like Windows is that
A. Linux is a proprietary whereas Windows is not
B. Windows can run with an Intel processor, whereas Linux cannot
C. There are multiple versions of Linux, but only one version of Windows
D. Any programmer can modify Linux code which is not permitted with Windows
What is the correct answer?
4
______________is responsible for allocating primary memory to processes and for assisting the programmer in loading and storing the contents of the primary memory.
C. Database administrator
What is the correct answer?
4
Ext2 is the standard file system of _______ and uses a block size of_____bytes
What is the correct answer?
4
Creation of a semaphore set is done using the _______system call.
What is the correct answer?
4
A process is ____________________
A. A program in Execution.
B. An asynchronous activity.
C. The 'dispatchable' unit.
What is the correct answer?
4
An unauthorized party inserts counterfeit objects into the system is called_________________
What is the correct answer?
4
IDL stands for_____________________
A. Integrated Data library
C. Interface Data Language
D. Interface Definition Language
What is the correct answer?
4
Find out the characteristics of System-oriented names:
A. They are large integers or bit strings.
B. They are of the same size
C. Generally shorter than human-oriented names and are easy for manipulations like hashing, sorting and so on.
What is the correct answer?
4
When resources have multiple instances ________ is used for deadlock Avoidance.
B. Resource Allocation Graph
What is the correct answer?
4
In ____________ location policies a random node is polled to check its state and the task is transferred if it will not be overloaded; polling is continued until a suitable node is found.
What is the correct answer?
4
Identify the server:
This type of server generally remains in existence indefinitely. It is shared by many clients. Servers of this type are created and installed before the clients use them.
A. Instance-per-call-servers
C. Non-Persistent Servers
What is the correct answer?
4
In _______, if a processor writes the value 100 to the memory location x, this write operation will only change the contents of its local memory and will not affect the contents of the memory of any other processor.
A. Tightly coupled systems,
B. Loosely coupled systems
C. Parallel processing systems
D. File management system
What is the correct answer?
4
___________variable is not automatically created on all UNIX systems but is used by so many programs that it is considered a standard environment variable.
What is the correct answer?
4
You can move a window to a different position on your screen by dragging it by its
What is the correct answer?
4
In case of ____________________transparency a file can transparently move to another server.
What is the correct answer?
4
______________approach simplifies debugging and system verification.
What is the correct answer?
4
______________ are popular way to improve application through parallelism.
What is the correct answer?
4
The Network Time Protocol is similar to _______________algorithm in that synchronization is also performed using time servers and an attempt is made to correct for communication latencies.
What is the correct answer?
4
In___________, the requesting device or devices assert the signal bus_request.
A. Priority encoded arbitration
B. Distributed arbitration by self-selection
D. Daisy chain arbitration
What is the correct answer?
4
The _____________ are based on modification of the original message in some manner, or on creation of a false message.
B. Release of message content attack
C. Traffic analysis attack
What is the correct answer?
4
______________ occurs when multiple processes or threads read and write data items so that the final result depends on the order of execution of instructions in the multiple processes.
What is the correct answer?
4
Which one of the following statements is true?
A. The cat command cares which file it receives as input or where the input goes.
B. Relative pathnames begin with something other than the slash character
C. UNIX shells never remember their current working directory (CW.
D. The cat command interprets -X as an option character rather than a pathname.