Home
Current Affairs January 2024

What is the correct answer?

4

In ____________ location policies a random node is polled to check its state and the task is transferred if it will not be overloaded; polling is continued until a suitable node is found.

A. Threshold

B. Shortest

C. Bidding

D. Pairing

Correct Answer :

A. Threshold


Related Questions

What is the correct answer?

4

Which command is used to display the contents of the text file of DOS?

A. Copy

B. Copy con

C. Dir

D. Type

What is the correct answer?

4

A bar that inform you the available options in your computer, opened applications, background running applications and can be used to switch between applications quickly is

A. Menu bar

B. Tool bar

C. Status bar

D. Task bar

What is the correct answer?

4

Ext2 is the standard file system of _______ and uses a block size of_____bytes

A. MS DOS,8K

B. Linux ,1024

C. Linux, 512

D. Unix, 512

What is the correct answer?

4

Find out the characteristics of System-oriented names:

A. They are large integers or bit strings.

B. They are of the same size

C. Generally shorter than human-oriented names and are easy for manipulations like hashing, sorting and so on.

D. All A, B, C

What is the correct answer?

4

All of the following are TRUE regarding virtual memory EXCEPT

A. Any amount of RAM can be allocated to virtual memory

B. The setting for the amount of hard disk drive space to allocate virtual memory can be manually change

C. This temporary storage is called the swap file or page file

D. Virtual memory is the physical space o the hard drive

What is the correct answer?

4

Most accurate global time is based on oscillations of the ______________

A. Cesium-130 atom

B. Cesium-133 atom

C. Cesium-136 atom

D. Cesium-139 atom

What is the correct answer?

4

__________ deals with when a modified page should be written out to secondary memory.

A. Cleaning policy

B. Fetch policy

C. Frame locking

D. None

What is the correct answer?

4

In Multics, a process could have up to 256K segments, but each segment was limited to ___________ 64K words.

A. 64K

B. 32K

C. 1024K

D. 112K

What is the correct answer?

4

In _______, if a processor writes the value 100 to the memory location x, this write operation will only change the contents of its local memory and will not affect the contents of the memory of any other processor.

A. Tightly coupled systems,

B. Loosely coupled systems

C. Parallel processing systems

D. File management system

What is the correct answer?

4

Windows 2000 supports -------------- type of file system

A. NTFS

B. EFS

C. FEFS

D. EFFS

What is the correct answer?

4

A page fault occurs when

A. the page is not found in the memory

B. the page is found in the memory

C. the Segmentation starts

D. the Deadlock happens

What is the correct answer?

4

In MS-DOS, the interfaces and levels of functionality are _______________

A. not well separated.

B. well separated

C. independent

D. dependent

What is the correct answer?

4

Which one is true for unconditional disk formatting?

A. Transfer system files after format

B. Do not check/scan surface after format

C. Destroys every byte of data on a disk by overwriting it with with blank spaces

D. All of above

What is the correct answer?

4

Which of the following is suitable after you install new drivers?

A. Hibernate

B. Sleep

C. Restart

D. Shut Down

What is the correct answer?

4

A small part of taskbar that has icons of background running applications is

A. Start button

B. Quick launch

C. Task bar

D. System tray

What is the correct answer?

4

In Windows, start button is used to

A. Device setting

B. Run applications

C. All of above

D. Turn off the system

What is the correct answer?

4

The time taken by the Dispatcher to stop one process and start another running is known as _________________.

A. Turnaround time

B. Dispatch Latency

C. Access time

D. Response time

What is the correct answer?

4

In_________________ model, when a process does a release access, the contents of all the modifications are not immediately sent to other nodes but they are sent only on demand.

A. Release Consistency Model

B. Lazy Release consistency model

C. Weak Consistency Model

D. Processor Consistency Model

What is the correct answer?

4

DSM stands for______________

A. Direct shared memory

B. Direct system memory

C. Distributed shared memory

D. Distributed system memory

What is the correct answer?

4

You can use print manage window

A. To cancel the print job

B. To check status of files in the print queue

C. To interrupt printing

D. All of the above

What is the correct answer?

4

What is Dr. Watson?

A. IT Expert

B. Diagnosis tool

C. Surgeon

D. None

What is the correct answer?

4

______________ occurs when multiple processes or threads read and write data items so that the final result depends on the order of execution of instructions in the multiple processes.

A. Race condition

B. Mutual exclusion

C. Exception

D. Interrupt

What is the correct answer?

4

A shared memory segment first needs to be allocated (create, using the__________ system call.

A. semget()

B. msgrcv()

C. shmget()

D. mknod()

What is the correct answer?

4

Which of the following does not occur during the power-on-self-test (POST)?

A. The scandisk utility begins to run

B. The video card and video memory are tested

C. The BIOS identification process occurs

D. Memory chip are checked to ensure that they are working properly

What is the correct answer?

4

In the case of____________ , changes to an open file are only locally visible.

A. session semantics

B. immutable files

C. atomic transactions

D. None of the above.

What is the correct answer?

4

Choose the correct statement from the following.

A. In computer terminology, variables are symbols which stand for some value.

B. An alternative method for executing the commands in the file backup is to make the file as directory.

C. The restricted shell gives more control to the system administrator and restricts the options of the user.

D. The decision making done by computer programs is in the form of conditional execution.

What is the correct answer?

4

The ______________ unpacks the call receipt messages from local RPC Runtime and makes a perfect local call to invoke the appropriate procedure in the server.

A. server Stub

B. server

C. client

D. client stub

What is the correct answer?

4

In case of ____________________transparency a file can transparently move to another server.

A. Location

B. Migration

C. Replication

D. Concurrency

What is the correct answer?

4

_____________ manage the name spaces and binds an object to its location.

A. Name Server

B. Name agent

C. Context

D. Name resolution

What is the correct answer?

4

Identify the server:
This type of server generally remains in existence indefinitely. It is shared by many clients. Servers of this type are created and installed before the clients use them.

A. Instance-per-call-servers

B. Persistent Servers

C. Non-Persistent Servers

D. Semantic server