Home
Current Affairs January 2024

What is the correct answer?

4

______________is responsible for allocating primary memory to processes and for assisting the programmer in loading and storing the contents of the primary memory.

A. Operating system

B. Memory manager

C. Database administrator

D. RAM

Correct Answer :

B. Memory manager


Related Questions

What is the correct answer?

4

You can move a window to a different position on your screen by dragging it by its

A. Tail

B. Move handle

C. Status bar

D. Title bar

What is the correct answer?

4

____________approach can place the data directly into the memory or take the data directly from the memory without direct intervention from the processor.

A. DMA

B. Daisy chain arbitration

C. polling

D. none of these

What is the correct answer?

4

In ________________________ each node periodically sends a message to the time server.

A. Passive Time Server Centralized Algorithm

B. Active Time Server Centralized Algorithm

C. Global Averaging Distributed Algorithms

D. Localized Averaging Distributed Algorithms

What is the correct answer?

4

You can use print manage window

A. To cancel the print job

B. To check status of files in the print queue

C. To interrupt printing

D. All of the above

What is the correct answer?

4

Which components appear in the initial windows start up display?

A. Dialog box

B. Task bar

C. Start menu

D. All of the above

What is the correct answer?

4

Most accurate global time is based on oscillations of the ______________

A. Cesium-130 atom

B. Cesium-133 atom

C. Cesium-136 atom

D. Cesium-139 atom

What is the correct answer?

4

A process is already split into pieces, called________________.

A. Tasks

B. Program

C. Processors

D. Routines

What is the correct answer?

4

DSM stands for______________

A. Direct shared memory

B. Direct system memory

C. Distributed shared memory

D. Distributed system memory

What is the correct answer?

4

Which command is used to display the contents of the text file of DOS?

A. Copy

B. Copy con

C. Dir

D. Type

What is the correct answer?

4

_______________occurs when two or more execution flows are able to run simultaneously.

A. Deadlock

B. Concurrency

C. race condition

D. interrupt

What is the correct answer?

4

In the case of____________, message remains in the senders address space until the receiver executes the corresponding receive.

A. No buffering

B. Single message buffering

C. Unbounded-capacity buffer

D. Finite bound buffer

What is the correct answer?

4

______________is a mechanism the prevents two or more processes from accessing a shared resource simultaneously.

A. Livelock

B. Preemption

C. Semaphore

D. either or

What is the correct answer?

4

Which buffering strategy is used for implementing synchronous communication?

A. Single message buffer

B. Unbounded - Capacity buffer

C. Finite-Bound Buffer

D. All can be used.

What is the correct answer?

4

The two sub systems of user mode layer of windows 2000 are _________ and __________

A. excel, executive

B. environment, integral

C. orbit , kernel

D. Kernel , executive

What is the correct answer?

4

Transparent RPC mechanism refers to :

A. Existance of multuple computer visible and a provide a single system image to its users.

B. It runs the program transparently.

C. It is a technique to shift the program to other computer.

D. It is technique in which local procedures and remote procedures are indistinguishable to programmers.

What is the correct answer?

4

A process control block contains varies attributes required by _____________ to control a process.

A. RAM

B. virtual memory

C. BIOS

D. Operating System

What is the correct answer?

4

Bootstrapping is also known as ______

A. cold-hot boot

B. hot boot

C. hot strap

D. cold boot

What is the correct answer?

4

In case of modification an unauthorized party not only gains access to but tampers with an asset. This is an attack on ____________________.

A. availability

B. confidentiality

C. integrity

D. authenticity

What is the correct answer?

4

__________ deals with when a modified page should be written out to secondary memory.

A. Cleaning policy

B. Fetch policy

C. Frame locking

D. None

What is the correct answer?

4

______________ are popular way to improve application through parallelism.

A. Processes

B. Threads

C. Context switching

D. none of these

What is the correct answer?

4

Which of the following is drop down list?

A. Combo box

B. List

C. Text area

D. None

What is the correct answer?

4

Creation of a semaphore set is done using the _______system call.

A. semget()

B. semsget()

C. mknod()

D. sempget()

What is the correct answer?

4

______________ refers to the technology in which some space in hard disk is used as an extension of main memory.

A. Cache memory

B. Paging

C. Virtual memory

D. Associative memory

What is the correct answer?

4

When resources have multiple instances ________ is used for deadlock Avoidance.

A. Bankers algorithm

B. Resource Allocation Graph

C. semaphores

D. all of these

What is the correct answer?

4

In___________, the requesting device or devices assert the signal bus_request.

A. Priority encoded arbitration

B. Distributed arbitration by self-selection

C. Priority arbitration

D. Daisy chain arbitration

What is the correct answer?

4

A _______________in a distributed system is a string of bits or characters that is used to refer to an entity.

A. name

B. attribute

C. identifiers

D. addresses

What is the correct answer?

4

Pick the wrong statement from the following.

A. UNIX systems originally came with a command interpreter called the Bourne Shell.

B. The cat command takes any characters from standard input, and then echoes them to standard output.

C. A pipe is a means of taking the output of one command and directing it as another command.

D. The manual entry is called a man page, even though it is often more than one page long.

What is the correct answer?

4

In layered approach each layer uses the functions and services of ------------------

A. kernel

B. lower-level layers

C. higher-level layers

D. all of these

What is the correct answer?

4

A _____________is a collection of processors that do not share memory, peripheral devices,or a clock.

A. Computer system

B. distributed system

C. network

D. None of the above

What is the correct answer?

4

A two-byte integer called ____________is interpreted as an index into an array of inodes in a fixed, known location on disk.

A. an inode

B. an inumber

C. an imap

D. an imark