Home
Current Affairs January 2024

What is the correct answer?

4

An orphan process is automatically inherited by the _____and becomes a _______ of this process.

A. 'init' process, father

B. 'init' process, child

C. 'initial process, father

D. 'it' process, child

Correct Answer :

B. 'init' process, child


Related Questions

What is the correct answer?

4

DSM stands for______________

A. Direct shared memory

B. Direct system memory

C. Distributed shared memory

D. Distributed system memory

What is the correct answer?

4

Which of the following operating system reads and reacts in actual time?

A. Quick Response System

B. Time Sharing System

C. Batch Processing System

D. Real Time System

What is the correct answer?

4

Which components appear in the initial Windows start up display?

A. Start menu

B. Dialog boxes

C. Taskbar

D. All of above

What is the correct answer?

4

You can use print manage window

A. To cancel the print job

B. To check status of files in the print queue

C. To interrupt printing

D. All of the above

What is the correct answer?

4

The Basic Input Output System (BIOS) resides in

A. RAM

B. ROM

C. The CPU

D. Memory Cache

What is the correct answer?

4

The primary purpose of an operating system is a …

A. To allow people to use the computer

B. To make the most efficient use of computer hardware

C. To make computer easier to use

D. To keep system programmer employed

What is the correct answer?

4

______________ occurs when multiple processes or threads read and write data items so that the final result depends on the order of execution of instructions in the multiple processes.

A. Race condition

B. Mutual exclusion

C. Exception

D. Interrupt

What is the correct answer?

4

When a child dies, it sends a _______________signal to its parent.

A. SIGCHLD

B. EDEADLK

C. WNOHANG

D. SEDECHLD

What is the correct answer?

4

______________ selects a process from among the ready processes to execute on the CPU.

A. CPU Scheduler

B. Loader

C. Dispatcher

D. Compiler

What is the correct answer?

4

What do you mean by 0-reliable level in multicast communication?

A. Multiple responses is expected from any receivers.

B. No response is expected from any receivers.

C. Multiple responses is expected from multiple receivers.

D. A multicast message is received by all the members of the group or none.

What is the correct answer?

4

The time taken by the Dispatcher to stop one process and start another running is known as _________________.

A. Turnaround time

B. Dispatch Latency

C. Access time

D. Response time

What is the correct answer?

4

The find command is different from most UNIX commands in that each of the argument expressions following the beginning path name is considered a _____________

A. action expression

B. Boolean expression.

C. Boolean constant

D. Search qualifiers

What is the correct answer?

4

____________ file system allows sharing in multiple different locations grouped under one folder.

A. Direct

B. distributed

C. sequential

D. parallel

What is the correct answer?

4

The ___ contains commands associated with the My Computer window

A. Start menu

B. Standard menu

C. System menu

D. None of the above

What is the correct answer?

4

A bar that inform you the available options in your computer, opened applications, background running applications and can be used to switch between applications quickly is

A. Menu bar

B. Tool bar

C. Status bar

D. Task bar

What is the correct answer?

4

SRM stands for

A. Security Resource Manager

B. Secret Resource Manager

C. Security Reference Monitor

D. Security Reference Manual

What is the correct answer?

4

The controller can access memory in memory cycles which are not used by the particular bank of memory into which the DMA controller is writing data. This approach, called _________

A. interrupting

B. cycle stealing

C. swapping

D. paging

What is the correct answer?

4

_______refers to the block size of the DSM system, i.e. to the units of sharing and the unit of data transfer across the network when a network block fault occurs.

A. Granularity

B. Coherence

C. Abstraction

D. Synchronization

What is the correct answer?

4

The problem with logical dumping is ________________

A. very costly

B. very slow

C. human errors

D. all of these

What is the correct answer?

4

The _________takes any characters from standard input, and then echoes them to standard output.

A. kill character

B. cat command

C. cate command

D. control command

What is the correct answer?

4

The early ARPAnet is an example of a distributed computing system based on the ________________.

A. Minicomputer model

B. Workstation model

C. Hybrid model

D. Processor pool model

What is the correct answer?

4

In_________________ model, when a process does a release access, the contents of all the modifications are not immediately sent to other nodes but they are sent only on demand.

A. Release Consistency Model

B. Lazy Release consistency model

C. Weak Consistency Model

D. Processor Consistency Model

What is the correct answer?

4

Process migration involves__________________

A. Selection of a process to be migrated

B. Selection of destination system or node

C. Actual transfer of the selected process to the destination system or node

D. All A, B, C

What is the correct answer?

4

A page fault occurs when

A. the page is not found in the memory

B. the page is found in the memory

C. the Segmentation starts

D. the Deadlock happens

What is the correct answer?

4

An operating system version designed for use with a media center PC is Microsoft Windows XP

A. Media center edition

B. Home edition

C. Tablet PC edition

D. None of above

What is the correct answer?

4

A process is already split into pieces, called________________.

A. Tasks

B. Program

C. Processors

D. Routines

What is the correct answer?

4

When resources have multiple instances ________ is used for deadlock Avoidance.

A. Bankers algorithm

B. Resource Allocation Graph

C. semaphores

D. all of these

What is the correct answer?

4

The ______________ unpacks the call receipt messages from local RPC Runtime and makes a perfect local call to invoke the appropriate procedure in the server.

A. server Stub

B. server

C. client

D. client stub

What is the correct answer?

4

A _______________in a distributed system is a string of bits or characters that is used to refer to an entity.

A. name

B. attribute

C. identifiers

D. addresses

What is the correct answer?

4

In the case of____________ , changes to an open file are only locally visible.

A. session semantics

B. immutable files

C. atomic transactions

D. None of the above.