Home
Current Affairs January 2024

What is the correct answer?

4

In layered approach each layer uses the functions and services of ------------------

A. kernel

B. lower-level layers

C. higher-level layers

D. all of these

Correct Answer :

B. lower-level layers


Related Questions

What is the correct answer?

4

Find out the characteristics of System-oriented names:

A. They are large integers or bit strings.

B. They are of the same size

C. Generally shorter than human-oriented names and are easy for manipulations like hashing, sorting and so on.

D. All A, B, C

What is the correct answer?

4

Which components appear in the initial windows start up display?

A. Dialog box

B. Task bar

C. Start menu

D. All of the above

What is the correct answer?

4

A page fault occurs when

A. the page is not found in the memory

B. the page is found in the memory

C. the Segmentation starts

D. the Deadlock happens

What is the correct answer?

4

A shared memory segment first needs to be allocated (create, using the__________ system call.

A. semget()

B. msgrcv()

C. shmget()

D. mknod()

What is the correct answer?

4

IDL stands for_____________________

A. Integrated Data library

B. Isolated Data Library

C. Interface Data Language

D. Interface Definition Language

What is the correct answer?

4

The maximum size of a write file is limited to only

A. Name of the file

B. Extension of the file

C. The amount of memory in your computer

D. All of above

What is the correct answer?

4

A sequence of instructions telling the computer what to do is called a_____________

A. program

B. language

C. translator

D. package

What is the correct answer?

4

An option commonly takes the form of a _____followed by __________characters.

A. dot, one or more

B. dash, only one

C. dash, one or more

D. dot,only two

What is the correct answer?

4

Fsck conducts a check in _____ phases

A. One

B. Two

C. Five

D. Eight

What is the correct answer?

4

A process is already split into pieces, called________________.

A. Tasks

B. Program

C. Processors

D. Routines

What is the correct answer?

4

The find command is different from most UNIX commands in that each of the argument expressions following the beginning path name is considered a _____________

A. action expression

B. Boolean expression.

C. Boolean constant

D. Search qualifiers

What is the correct answer?

4

In case of ________________the server automatically copies files to other servers after the files are written.

A. Explicit replication

B. Implicit replication

C. Lazy file replication

D. Group file replication

What is the correct answer?

4

RPN stands for

A. Reverse Polish Notation

B. Record Police Notation

C. Record Polish Notation

D. Reverse Police Negation

What is the correct answer?

4

____________approach can place the data directly into the memory or take the data directly from the memory without direct intervention from the processor.

A. DMA

B. Daisy chain arbitration

C. polling

D. none of these

What is the correct answer?

4

Identify the distributed computing model from the following statement. In this model, the user's processes need not be migrated to the server machines for getting the work done by those machines.

A. Minicomputer model

B. Workstation model

C. Workstation-Server model

D. Processor pool model

What is the correct answer?

4

The problem with logical dumping is ________________

A. very costly

B. very slow

C. human errors

D. all of these

What is the correct answer?

4

______________ selects a process from among the ready processes to execute on the CPU.

A. CPU Scheduler

B. Loader

C. Dispatcher

D. Compiler

What is the correct answer?

4

The early ARPAnet is an example of a distributed computing system based on the ________________.

A. Minicomputer model

B. Workstation model

C. Hybrid model

D. Processor pool model

What is the correct answer?

4

______________ refers to the technology in which some space in hard disk is used as an extension of main memory.

A. Cache memory

B. Paging

C. Virtual memory

D. Associative memory

What is the correct answer?

4

A _____________is a collection of processors that do not share memory, peripheral devices,or a clock.

A. Computer system

B. distributed system

C. network

D. None of the above

What is the correct answer?

4

Which one is true for unconditional disk formatting?

A. Transfer system files after format

B. Do not check/scan surface after format

C. Destroys every byte of data on a disk by overwriting it with with blank spaces

D. All of above

What is the correct answer?

4

Process migration involves__________________

A. Selection of a process to be migrated

B. Selection of destination system or node

C. Actual transfer of the selected process to the destination system or node

D. All A, B, C

What is the correct answer?

4

Which of the following does not occur during the power-on-self-test (POST)?

A. The scandisk utility begins to run

B. The video card and video memory are tested

C. The BIOS identification process occurs

D. Memory chip are checked to ensure that they are working properly

What is the correct answer?

4

In case of good process migration mechanism, _____________ means failure of any node other than the one on which the process is running should not affect the execution of the process.

A. Robustness

B. Efficiency

C. Transparent

D. Interference

What is the correct answer?

4

_____________ manage the name spaces and binds an object to its location.

A. Name Server

B. Name agent

C. Context

D. Name resolution

What is the correct answer?

4

The time taken by the Dispatcher to stop one process and start another running is known as _________________.

A. Turnaround time

B. Dispatch Latency

C. Access time

D. Response time

What is the correct answer?

4

When copying more than one file at a time, you must specify an existing directory as the ___________

A. Source

B. Sub directory

C. Destination.

D. Path name

What is the correct answer?

4

_____________typically contains temporary data such as subroutine parameter, return address, and temporary variables.

A. Current value of Program Counter

B. Value of the variables

C. The process stack

D. A data section

What is the correct answer?

4

In case of ____________________transparency a file can transparently move to another server.

A. Location

B. Migration

C. Replication

D. Concurrency

What is the correct answer?

4

Bootstrapping is also known as ______

A. cold-hot boot

B. hot boot

C. hot strap

D. cold boot