Home
Current Affairs January 2024

What is the correct answer?

4

Find out the characteristics of System-oriented names:

A. They are large integers or bit strings.

B. They are of the same size

C. Generally shorter than human-oriented names and are easy for manipulations like hashing, sorting and so on.

D. All A, B, C

Correct Answer :

D. All A, B, C


Related Questions

What is the correct answer?

4

The algorithm should be scalable i.e. _____________.

A. The system should not enter a state in which nodes spend all their time migrating processes or exchanging control messages without doing any useful work.

B. The system should be able to handle small and large networked systems.

C. The algorithm should not be affected by the crash of one or more nodes in the system.

D. The process assignment decisions should be based on the current load of the system and not on some fixed static policy.

What is the correct answer?

4

The Bankers algorithm is used

A. to prevent deadlock

B. to rectify deadlock

C. to detect deadlock

D. to slove deadlock

What is the correct answer?

4

An operating system version designed for use with a media center PC is Microsoft Windows XP

A. Media center edition

B. Home edition

C. Tablet PC edition

D. None of above

What is the correct answer?

4

An orphan process is automatically inherited by the _____and becomes a _______ of this process.

A. 'init' process, father

B. 'init' process, child

C. 'initial process, father

D. 'it' process, child

What is the correct answer?

4

One of the wonderful things about UNIX is its ___________names.

A. Unlimited path

B. Unlimited directory

C. Limited path

D. Limited file

What is the correct answer?

4

In MS-DOS, the interfaces and levels of functionality are _______________

A. not well separated.

B. well separated

C. independent

D. dependent

What is the correct answer?

4

What is dispatch latency?

A. The time taken by the dispatcher to stop one process and start another

B. The whole time taken by all processor

C. The time taken by the processor to write a file into disk

D. None of Above

What is the correct answer?

4

In case of ____________________transparency a file can transparently move to another server.

A. Location

B. Migration

C. Replication

D. Concurrency

What is the correct answer?

4

An option commonly takes the form of a _____followed by __________characters.

A. dot, one or more

B. dash, only one

C. dash, one or more

D. dot,only two

What is the correct answer?

4

When you start up the computer the boot up storage at which the BIOS versions manufacturer and data are displayed on the monitor is called

A. Bootstrap

B. System configuration

C. Power on self test (POST)

D. Kernel loading

What is the correct answer?

4

In ____________ location policies a random node is polled to check its state and the task is transferred if it will not be overloaded; polling is continued until a suitable node is found.

A. Threshold

B. Shortest

C. Bidding

D. Pairing

What is the correct answer?

4

In case of ________________the server automatically copies files to other servers after the files are written.

A. Explicit replication

B. Implicit replication

C. Lazy file replication

D. Group file replication

What is the correct answer?

4

______________approach simplifies debugging and system verification.

A. Kernel

B. Layered

C. Extended

D. Virtual machine

What is the correct answer?

4

A sequence of instructions telling the computer what to do is called a_____________

A. program

B. language

C. translator

D. package

What is the correct answer?

4

Pick the wrong statement from the following.

A. UNIX systems originally came with a command interpreter called the Bourne Shell.

B. The cat command takes any characters from standard input, and then echoes them to standard output.

C. A pipe is a means of taking the output of one command and directing it as another command.

D. The manual entry is called a man page, even though it is often more than one page long.

What is the correct answer?

4

The ______________ unpacks the call receipt messages from local RPC Runtime and makes a perfect local call to invoke the appropriate procedure in the server.

A. server Stub

B. server

C. client

D. client stub

What is the correct answer?

4

BSD stands for_____________________

A. Basic Software Division

B. Berkeley Software Distribution

C. British Software Distribution

D. Berkeley Software data

What is the correct answer?

4

IDL stands for_____________________

A. Integrated Data library

B. Isolated Data Library

C. Interface Data Language

D. Interface Definition Language

What is the correct answer?

4

What do you mean by 0-reliable level in multicast communication?

A. Multiple responses is expected from any receivers.

B. No response is expected from any receivers.

C. Multiple responses is expected from multiple receivers.

D. A multicast message is received by all the members of the group or none.

What is the correct answer?

4

A solution to starvation is _____________.

A. segmentation

B. Aging

C. Paging

D. virtual memory

What is the correct answer?

4

The _____________ are based on modification of the original message in some manner, or on creation of a false message.

A. Passive attack

B. Release of message content attack

C. Traffic analysis attack

D. Active attack

What is the correct answer?

4

A two-byte integer called ____________is interpreted as an index into an array of inodes in a fixed, known location on disk.

A. an inode

B. an inumber

C. an imap

D. an imark

What is the correct answer?

4

A process is already split into pieces, called________________.

A. Tasks

B. Program

C. Processors

D. Routines

What is the correct answer?

4

______________ selects a process from among the ready processes to execute on the CPU.

A. CPU Scheduler

B. Loader

C. Dispatcher

D. Compiler

What is the correct answer?

4

Fsck conducts a check in _____ phases

A. One

B. Two

C. Five

D. Eight

What is the correct answer?

4

Windows 2000 supports -------------- type of file system

A. NTFS

B. EFS

C. FEFS

D. EFFS

What is the correct answer?

4

PVM stands for

A. Parallel Virtual Machine

B. Parallel Virtual Message

C. Process Virtual Machine

D. Process Virtual Monitor

What is the correct answer?

4

Choose the correct statement from the following.

A. In computer terminology, variables are symbols which stand for some value.

B. An alternative method for executing the commands in the file backup is to make the file as directory.

C. The restricted shell gives more control to the system administrator and restricts the options of the user.

D. The decision making done by computer programs is in the form of conditional execution.

What is the correct answer?

4

Which buffering strategy is used for implementing synchronous communication?

A. Single message buffer

B. Unbounded - Capacity buffer

C. Finite-Bound Buffer

D. All can be used.

What is the correct answer?

4

In the case of____________ , changes to an open file are only locally visible.

A. session semantics

B. immutable files

C. atomic transactions

D. None of the above.