Home

Choose the correct statement from the following.

A. In computer terminology, variables are symbols which stand for some value.

B. An alternative method for executing the commands in the file backup is to make the file as directory.

C. The restricted shell gives more control to the system administrator and restricts the options of the user.

D. The decision making done by computer programs is in the form of conditional execution.

Related Questions

  1. IPC stands for _________
  2. In _______, if a processor writes the value 100 to the memory location x, this write operation will…
  3. PVM stands for
  4. ______________ refers to the technology in which some space in hard disk is used as an extension of…
  5. Two clocks are said to be synchronized at a particular instance of time if the difference in time values…
  6. IDL stands for_____________________
  7. The problem with logical dumping is ________________
  8. The primary purpose of an operating system is a …
  9. In Multics, a process could have up to 256K segments, but each segment was limited to ___________ 64K…
  10. In the case of____________ , changes to an open file are only locally visible.
  11. Because the I/O devices are not synchronized with the CPU, some information must be exchanged between…
  12. In case of good process migration mechanism, _____________ means failure of any node other than the…
  13. The two sub systems of user mode layer of windows 2000 are _________ and __________
  14. DSM stands for______________
  15. What is the function of radio button?
  16. In the case of____________, message remains in the senders address space until the receiver executes…
  17. Which one is true for unconditional disk formatting?
  18. Which of the following is drop down list?
  19. The find command is different from most UNIX commands in that each of the argument expressions following…
  20. The usual su command syntax is
  21. A page fault occurs when
  22. Ext2 is the standard file system of _______ and uses a block size of_____bytes
  23. In case of ____________________transparency a file can transparently move to another server.
  24. Which of the following is suitable after you install new drivers?
  25. _______________refers to a strategy where whenever a resource is requested, it is only granted if it…
  26. A process is _________________
  27. ____________approach can place the data directly into the memory or take the data directly from the…
  28. The controller can access memory in memory cycles which are not used by the particular bank of memory…
  29. The _________takes any characters from standard input, and then echoes them to standard output.
  30. _______refers to the block size of the DSM system, i.e. to the units of sharing and the unit of data…

Please do not use chat terms. Example: avoid using "grt" instead of "great".