Home
Current Affairs January 2024

What is the correct answer?

4

In the case of____________ , changes to an open file are only locally visible.

A. session semantics

B. immutable files

C. atomic transactions

D. None of the above.

Correct Answer :

A. session semantics


Related Questions

What is the correct answer?

4

The primary purpose of an operating system is:

A. To allow people to use the computer,

B. To make the most efficient use of the computer hardware

C. To make computers easier to use

D. To keep systems programmers employed

What is the correct answer?

4

Recently deleted files are stored in

A. Taskbar

B. Desktop

C. My computer

D. Recycle bin

What is the correct answer?

4

An operating system version designed for use with a media center PC is Microsoft Windows XP

A. Media center edition

B. Home edition

C. Tablet PC edition

D. None of above

What is the correct answer?

4

Bootstrapping is also known as ______

A. cold-hot boot

B. hot boot

C. hot strap

D. cold boot

What is the correct answer?

4

_______refers to the block size of the DSM system, i.e. to the units of sharing and the unit of data transfer across the network when a network block fault occurs.

A. Granularity

B. Coherence

C. Abstraction

D. Synchronization

What is the correct answer?

4

In ____________ location policies a random node is polled to check its state and the task is transferred if it will not be overloaded; polling is continued until a suitable node is found.

A. Threshold

B. Shortest

C. Bidding

D. Pairing

What is the correct answer?

4

Which is the layer of a computer system between the hardware and the user program

A. Operating system

B. Operating environment

C. System environment

D. None

What is the correct answer?

4

______________ are popular way to improve application through parallelism.

A. Processes

B. Threads

C. Context switching

D. none of these

What is the correct answer?

4

Which of the following operating system reads and reacts in actual time?

A. Quick Response System

B. Time Sharing System

C. Batch Processing System

D. Real Time System

What is the correct answer?

4

The find command is different from most UNIX commands in that each of the argument expressions following the beginning path name is considered a _____________

A. action expression

B. Boolean expression.

C. Boolean constant

D. Search qualifiers

What is the correct answer?

4

Whenever you move a directory from one location to another

A. The directory is moved the source file is not moved

B. All the subdirectory inside that directory are moved

C. All files inside the directory are moved

D. Both b and c

What is the correct answer?

4

One of the wonderful things about UNIX is its ___________names.

A. Unlimited path

B. Unlimited directory

C. Limited path

D. Limited file

What is the correct answer?

4

Because the I/O devices are not synchronized with the CPU, some information must be exchanged between the CPU and the device to ensure that the data is received reliably. This interaction between the CPU and an I/O device is usually referred to as ____________

A. polling

B. arbitration

C. handshaking

D. interrupting

What is the correct answer?

4

In _______, if a processor writes the value 100 to the memory location x, this write operation will only change the contents of its local memory and will not affect the contents of the memory of any other processor.

A. Tightly coupled systems,

B. Loosely coupled systems

C. Parallel processing systems

D. File management system

What is the correct answer?

4

SRM stands for

A. Security Resource Manager

B. Secret Resource Manager

C. Security Reference Monitor

D. Security Reference Manual

What is the correct answer?

4

A _____________is a collection of processors that do not share memory, peripheral devices,or a clock.

A. Computer system

B. distributed system

C. network

D. None of the above

What is the correct answer?

4

Wiretapping to capture data in a network is an example of ________________

A. interruption

B. interception

C. fabrication

D. modification

What is the correct answer?

4

Choose the correct statement from the following.

A. In computer terminology, variables are symbols which stand for some value.

B. An alternative method for executing the commands in the file backup is to make the file as directory.

C. The restricted shell gives more control to the system administrator and restricts the options of the user.

D. The decision making done by computer programs is in the form of conditional execution.

What is the correct answer?

4

___________variable is not automatically created on all UNIX systems but is used by so many programs that it is considered a standard environment variable.

A. IFS

B. MAIL

C. TERM

D. PATH

What is the correct answer?

4

A process is ____________________

A. A program in Execution.

B. An asynchronous activity.

C. The 'dispatchable' unit.

D. All A, B, C

What is the correct answer?

4

______________ refers to the technology in which some space in hard disk is used as an extension of main memory.

A. Cache memory

B. Paging

C. Virtual memory

D. Associative memory

What is the correct answer?

4

RPN stands for

A. Reverse Polish Notation

B. Record Police Notation

C. Record Polish Notation

D. Reverse Police Negation

What is the correct answer?

4

A standard UNIX system includes a set of ___________ and a set of ___________.

A. Commands ,files

B. Libraries, Applications

C. Libraries, files

D. Files, Applications

What is the correct answer?

4

Process migration involves__________________

A. Selection of a process to be migrated

B. Selection of destination system or node

C. Actual transfer of the selected process to the destination system or node

D. All A, B, C

What is the correct answer?

4

In case of modification an unauthorized party not only gains access to but tampers with an asset. This is an attack on ____________________.

A. availability

B. confidentiality

C. integrity

D. authenticity

What is the correct answer?

4

The ___ contains commands associated with the My Computer window

A. Start menu

B. Standard menu

C. System menu

D. None of the above

What is the correct answer?

4

A program to be executed must be in ---------------

A. main memory

B. secondary memory

C. virtual memory

D. Read only memory

What is the correct answer?

4

You can move a window to a different position on your screen by dragging it by its

A. Tail

B. Move handle

C. Status bar

D. Title bar

What is the correct answer?

4

A process is already split into pieces, called________________.

A. Tasks

B. Program

C. Processors

D. Routines

What is the correct answer?

4

The Bankers algorithm is used

A. to prevent deadlock

B. to rectify deadlock

C. to detect deadlock

D. to slove deadlock