Home
Current Affairs January 2024

What is the correct answer?

4

In___________, the requesting device or devices assert the signal bus_request.

A. Priority encoded arbitration

B. Distributed arbitration by self-selection

C. Priority arbitration

D. Daisy chain arbitration

Correct Answer :

D. Daisy chain arbitration


Related Questions

What is the correct answer?

4

The name services of DCE include ________

A. the Cell Directory Service

B. the Global Directory Service

C. the Global Directory Agent

D. A,B and C

What is the correct answer?

4

An orphan process is automatically inherited by the _____and becomes a _______ of this process.

A. 'init' process, father

B. 'init' process, child

C. 'initial process, father

D. 'it' process, child

What is the correct answer?

4

__________ deals with when a modified page should be written out to secondary memory.

A. Cleaning policy

B. Fetch policy

C. Frame locking

D. None

What is the correct answer?

4

The algorithm should be scalable i.e. _____________.

A. The system should not enter a state in which nodes spend all their time migrating processes or exchanging control messages without doing any useful work.

B. The system should be able to handle small and large networked systems.

C. The algorithm should not be affected by the crash of one or more nodes in the system.

D. The process assignment decisions should be based on the current load of the system and not on some fixed static policy.

What is the correct answer?

4

What is the function of radio button?

A. To select multiple option

B. To select single option

C. To select all option

D. All of above

What is the correct answer?

4

An option commonly takes the form of a _____followed by __________characters.

A. dot, one or more

B. dash, only one

C. dash, one or more

D. dot,only two

What is the correct answer?

4

Fsck conducts a check in _____ phases

A. One

B. Two

C. Five

D. Eight

What is the correct answer?

4

The Basic Input Output System (BIOS) resides in

A. RAM

B. ROM

C. The CPU

D. Memory Cache

What is the correct answer?

4

______________ are popular way to improve application through parallelism.

A. Processes

B. Threads

C. Context switching

D. none of these

What is the correct answer?

4

One of the wonderful things about UNIX is its ___________names.

A. Unlimited path

B. Unlimited directory

C. Limited path

D. Limited file

What is the correct answer?

4

Process migration involves__________________

A. Selection of a process to be migrated

B. Selection of destination system or node

C. Actual transfer of the selected process to the destination system or node

D. All A, B, C

What is the correct answer?

4

______________is responsible for allocating primary memory to processes and for assisting the programmer in loading and storing the contents of the primary memory.

A. Operating system

B. Memory manager

C. Database administrator

D. RAM

What is the correct answer?

4

______________is a mechanism the prevents two or more processes from accessing a shared resource simultaneously.

A. Livelock

B. Preemption

C. Semaphore

D. either or

What is the correct answer?

4

A sequence of instructions telling the computer what to do is called a_____________

A. program

B. language

C. translator

D. package

What is the correct answer?

4

In ________________________ each node periodically sends a message to the time server.

A. Passive Time Server Centralized Algorithm

B. Active Time Server Centralized Algorithm

C. Global Averaging Distributed Algorithms

D. Localized Averaging Distributed Algorithms

What is the correct answer?

4

Load balancing algorithms in ______________ class use the processor and process characteristics to allocate processes to nodes.

A. Static

B. Dynamic

C. Deterministic

D. Probabilistic

What is the correct answer?

4

The early ARPAnet is an example of a distributed computing system based on the ________________.

A. Minicomputer model

B. Workstation model

C. Hybrid model

D. Processor pool model

What is the correct answer?

4

Which is the layer of a computer system between the hardware and the user program

A. Operating system

B. Operating environment

C. System environment

D. None

What is the correct answer?

4

Which command is used to display the contents of the text file of DOS?

A. Copy

B. Copy con

C. Dir

D. Type

What is the correct answer?

4

PVM stands for

A. Parallel Virtual Machine

B. Parallel Virtual Message

C. Process Virtual Machine

D. Process Virtual Monitor

What is the correct answer?

4

The problem with logical dumping is ________________

A. very costly

B. very slow

C. human errors

D. all of these

What is the correct answer?

4

The date and time displays on

A. Taskbar

B. Launch pad

C. Status bar

D. System tray

What is the correct answer?

4

In the case of____________ , changes to an open file are only locally visible.

A. session semantics

B. immutable files

C. atomic transactions

D. None of the above.

What is the correct answer?

4

You can move a window to a different position on your screen by dragging it by its

A. Tail

B. Move handle

C. Status bar

D. Title bar

What is the correct answer?

4

When copying more than one file at a time, you must specify an existing directory as the ___________

A. Source

B. Sub directory

C. Destination.

D. Path name

What is the correct answer?

4

A process is ____________________

A. A program in Execution.

B. An asynchronous activity.

C. The 'dispatchable' unit.

D. All A, B, C

What is the correct answer?

4

An unauthorized party inserts counterfeit objects into the system is called_________________

A. interruption

B. interception

C. fabrication

D. modification

What is the correct answer?

4

A process control block contains varies attributes required by _____________ to control a process.

A. RAM

B. virtual memory

C. BIOS

D. Operating System

What is the correct answer?

4

Which components appear in the initial windows start up display?

A. Dialog box

B. Task bar

C. Start menu

D. All of the above

What is the correct answer?

4

Wiretapping to capture data in a network is an example of ________________

A. interruption

B. interception

C. fabrication

D. modification