Home
Current Affairs January 2024

What is the correct answer?

4

A SCSI device can transfer up to----------- of information per second.

A. 40 Mbytes

B. 60 Mbytes

C. 40 Gbytes

D. 60 Gbytes

Correct Answer :

A. 40 Mbytes


Related Questions

What is the correct answer?

4

Windows 2000 supports -------------- type of file system

A. NTFS

B. EFS

C. FEFS

D. EFFS

What is the correct answer?

4

A sequence of instructions telling the computer what to do is called a_____________

A. program

B. language

C. translator

D. package

What is the correct answer?

4

IPC stands for _________

A. Integrated parallel communication

B. Intermediate process call

C. Internal program call

D. Inter process communication

What is the correct answer?

4

Once text has been cut to the clipboard, you can____hat text into another document

A. Copy

B. Paste

C. Transfer

D. None of the above

What is the correct answer?

4

Underlined text, such as text and folder names is referred to as

A. Hyperlink

B. Menu

C. Source drive

D. None of these

What is the correct answer?

4

___________variable is not automatically created on all UNIX systems but is used by so many programs that it is considered a standard environment variable.

A. IFS

B. MAIL

C. TERM

D. PATH

What is the correct answer?

4

Wiretapping to capture data in a network is an example of ________________

A. interruption

B. interception

C. fabrication

D. modification

What is the correct answer?

4

A process is ____________________

A. A program in Execution.

B. An asynchronous activity.

C. The 'dispatchable' unit.

D. All A, B, C

What is the correct answer?

4

Which one is true for unconditional disk formatting?

A. Transfer system files after format

B. Do not check/scan surface after format

C. Destroys every byte of data on a disk by overwriting it with with blank spaces

D. All of above

What is the correct answer?

4

_______refers to the block size of the DSM system, i.e. to the units of sharing and the unit of data transfer across the network when a network block fault occurs.

A. Granularity

B. Coherence

C. Abstraction

D. Synchronization

What is the correct answer?

4

Which is the layer of a computer system between the hardware and the user program

A. Operating system

B. Operating environment

C. System environment

D. None

What is the correct answer?

4

DSM stands for______________

A. Direct shared memory

B. Direct system memory

C. Distributed shared memory

D. Distributed system memory

What is the correct answer?

4

______________ are popular way to improve application through parallelism.

A. Processes

B. Threads

C. Context switching

D. none of these

What is the correct answer?

4

The command used to create logical drive for specific location of disk

A. Format

B. Fdisk

C. Subst

D. All of the above

What is the correct answer?

4

Which of the following is suitable after you install new drivers?

A. Hibernate

B. Sleep

C. Restart

D. Shut Down

What is the correct answer?

4

All of the following are TRUE regarding virtual memory EXCEPT

A. Any amount of RAM can be allocated to virtual memory

B. The setting for the amount of hard disk drive space to allocate virtual memory can be manually change

C. This temporary storage is called the swap file or page file

D. Virtual memory is the physical space o the hard drive

What is the correct answer?

4

When copying more than one file at a time, you must specify an existing directory as the ___________

A. Source

B. Sub directory

C. Destination.

D. Path name

What is the correct answer?

4

An option commonly takes the form of a _____followed by __________characters.

A. dot, one or more

B. dash, only one

C. dash, one or more

D. dot,only two

What is the correct answer?

4

You can move a window to a different position on your screen by dragging it by its

A. Tail

B. Move handle

C. Status bar

D. Title bar

What is the correct answer?

4

Choose the correct statement from the following.

A. In computer terminology, variables are symbols which stand for some value.

B. An alternative method for executing the commands in the file backup is to make the file as directory.

C. The restricted shell gives more control to the system administrator and restricts the options of the user.

D. The decision making done by computer programs is in the form of conditional execution.

What is the correct answer?

4

Ext2 is the standard file system of _______ and uses a block size of_____bytes

A. MS DOS,8K

B. Linux ,1024

C. Linux, 512

D. Unix, 512

What is the correct answer?

4

In case of ________________the server automatically copies files to other servers after the files are written.

A. Explicit replication

B. Implicit replication

C. Lazy file replication

D. Group file replication

What is the correct answer?

4

A SCSI device can transfer up to----------- of information per second.

A. 40 Mbytes

B. 60 Mbytes

C. 40 Gbytes

D. 60 Gbytes

What is the correct answer?

4

The ___ contains commands associated with the My Computer window

A. Start menu

B. Standard menu

C. System menu

D. None of the above

What is the correct answer?

4

Initialization of I/O devices is part of the_________.

A. CPU

B. MSDOS

C. UNIX kernel

D. None of the above

What is the correct answer?

4

The controller can access memory in memory cycles which are not used by the particular bank of memory into which the DMA controller is writing data. This approach, called _________

A. interrupting

B. cycle stealing

C. swapping

D. paging

What is the correct answer?

4

_______________occurs when two or more execution flows are able to run simultaneously.

A. Deadlock

B. Concurrency

C. race condition

D. interrupt

What is the correct answer?

4

BSD stands for_____________________

A. Basic Software Division

B. Berkeley Software Distribution

C. British Software Distribution

D. Berkeley Software data

What is the correct answer?

4

______________approach simplifies debugging and system verification.

A. Kernel

B. Layered

C. Extended

D. Virtual machine

What is the correct answer?

4

_____________typically contains temporary data such as subroutine parameter, return address, and temporary variables.

A. Current value of Program Counter

B. Value of the variables

C. The process stack

D. A data section