Home
Current Affairs January 2024

What is the correct answer?

4

Creation of a semaphore set is done using the _______system call.

A. semget()

B. semsget()

C. mknod()

D. sempget()

Correct Answer :

A. semget()


Related Questions

What is the correct answer?

4

An orphan process is automatically inherited by the _____and becomes a _______ of this process.

A. 'init' process, father

B. 'init' process, child

C. 'initial process, father

D. 'it' process, child

What is the correct answer?

4

Load balancing algorithms in ______________ class use the processor and process characteristics to allocate processes to nodes.

A. Static

B. Dynamic

C. Deterministic

D. Probabilistic

What is the correct answer?

4

A sequence of instructions telling the computer what to do is called a_____________

A. program

B. language

C. translator

D. package

What is the correct answer?

4

____________approach can place the data directly into the memory or take the data directly from the memory without direct intervention from the processor.

A. DMA

B. Daisy chain arbitration

C. polling

D. none of these

What is the correct answer?

4

____________ file system allows sharing in multiple different locations grouped under one folder.

A. Direct

B. distributed

C. sequential

D. parallel

What is the correct answer?

4

______________approach simplifies debugging and system verification.

A. Kernel

B. Layered

C. Extended

D. Virtual machine

What is the correct answer?

4

_______________refers to a strategy where whenever a resource is requested, it is only granted if it cannot result in deadlock.

A. Deadlock Prevention

B. Livelock

C. Deadlock avoidance

D. none of these

What is the correct answer?

4

Which of the following operating system reads and reacts in actual time?

A. Quick Response System

B. Time Sharing System

C. Batch Processing System

D. Real Time System

What is the correct answer?

4

A program to be executed must be in ---------------

A. main memory

B. secondary memory

C. virtual memory

D. Read only memory

What is the correct answer?

4

In the case of____________ , changes to an open file are only locally visible.

A. session semantics

B. immutable files

C. atomic transactions

D. None of the above.

What is the correct answer?

4

Transparent RPC mechanism refers to :

A. Existance of multuple computer visible and a provide a single system image to its users.

B. It runs the program transparently.

C. It is a technique to shift the program to other computer.

D. It is technique in which local procedures and remote procedures are indistinguishable to programmers.

What is the correct answer?

4

______________is responsible for allocating primary memory to processes and for assisting the programmer in loading and storing the contents of the primary memory.

A. Operating system

B. Memory manager

C. Database administrator

D. RAM

What is the correct answer?

4

Windows 2000 supports -------------- type of file system

A. NTFS

B. EFS

C. FEFS

D. EFFS

What is the correct answer?

4

In the case of____________, message remains in the senders address space until the receiver executes the corresponding receive.

A. No buffering

B. Single message buffering

C. Unbounded-capacity buffer

D. Finite bound buffer

What is the correct answer?

4

Identify the distributed computing model from the following statement. In this model, the user's processes need not be migrated to the server machines for getting the work done by those machines.

A. Minicomputer model

B. Workstation model

C. Workstation-Server model

D. Processor pool model

What is the correct answer?

4

Which of the following is suitable after you install new drivers?

A. Hibernate

B. Sleep

C. Restart

D. Shut Down

What is the correct answer?

4

Pick the wrong statement from the following.

A. UNIX systems originally came with a command interpreter called the Bourne Shell.

B. The cat command takes any characters from standard input, and then echoes them to standard output.

C. A pipe is a means of taking the output of one command and directing it as another command.

D. The manual entry is called a man page, even though it is often more than one page long.

What is the correct answer?

4

A SCSI device can transfer up to----------- of information per second.

A. 40 Mbytes

B. 60 Mbytes

C. 40 Gbytes

D. 60 Gbytes

What is the correct answer?

4

_______refers to the block size of the DSM system, i.e. to the units of sharing and the unit of data transfer across the network when a network block fault occurs.

A. Granularity

B. Coherence

C. Abstraction

D. Synchronization

What is the correct answer?

4

The ___ contains commands associated with the My Computer window

A. Start menu

B. Standard menu

C. System menu

D. None of the above

What is the correct answer?

4

In case of modification an unauthorized party not only gains access to but tampers with an asset. This is an attack on ____________________.

A. availability

B. confidentiality

C. integrity

D. authenticity

What is the correct answer?

4

Fsck conducts a check in _____ phases

A. One

B. Two

C. Five

D. Eight

What is the correct answer?

4

______________ are popular way to improve application through parallelism.

A. Processes

B. Threads

C. Context switching

D. none of these

What is the correct answer?

4

__________ deals with when a modified page should be written out to secondary memory.

A. Cleaning policy

B. Fetch policy

C. Frame locking

D. None

What is the correct answer?

4

______________ refers to the technology in which some space in hard disk is used as an extension of main memory.

A. Cache memory

B. Paging

C. Virtual memory

D. Associative memory

What is the correct answer?

4

A process is already split into pieces, called________________.

A. Tasks

B. Program

C. Processors

D. Routines

What is the correct answer?

4

_________, as a feature of good distributed file system, clients should be able to continue working if a file server crashes. Likewise, data must not be lost and a restarted file server must be able to recover to a valid state.

A. Scalability

B. Reliability

C. Flexibility

D. Fault tolerance

What is the correct answer?

4

A _______________in a distributed system is a string of bits or characters that is used to refer to an entity.

A. name

B. attribute

C. identifiers

D. addresses

What is the correct answer?

4

Initialization of I/O devices is part of the_________.

A. CPU

B. MSDOS

C. UNIX kernel

D. None of the above

What is the correct answer?

4

Objects location is found by _________________

A. Broadcasting

B. Encoding Location of objects within UID

C. Searching creator node first and then broadcasting

D. All A, B, C