Home
Current Affairs January 2024

What is the correct answer?

4

Load balancing algorithms in ______________ class use the processor and process characteristics to allocate processes to nodes.

A. Static

B. Dynamic

C. Deterministic

D. Probabilistic

Correct Answer :

C. Deterministic


Related Questions

What is the correct answer?

4

When resources have multiple instances ________ is used for deadlock Avoidance.

A. Bankers algorithm

B. Resource Allocation Graph

C. semaphores

D. all of these

What is the correct answer?

4

A process may create a new process by executing ___________system call.

A. init

B. fork

C. create

D. new

What is the correct answer?

4

Which of the following is an essential file of a MS-DOS boot disk?

A. COMMANCOM

B. START.COM

C. VER.COM

D. TREE.COM

What is the correct answer?

4

The time taken by the Dispatcher to stop one process and start another running is known as _________________.

A. Turnaround time

B. Dispatch Latency

C. Access time

D. Response time

What is the correct answer?

4

A solution to starvation is _____________.

A. segmentation

B. Aging

C. Paging

D. virtual memory

What is the correct answer?

4

Whenever you move a directory from one location to another

A. The directory is moved the source file is not moved

B. All the subdirectory inside that directory are moved

C. All files inside the directory are moved

D. Both b and c

What is the correct answer?

4

Bootstrapping is also known as ______

A. cold-hot boot

B. hot boot

C. hot strap

D. cold boot

What is the correct answer?

4

The Bankers algorithm is used

A. to prevent deadlock

B. to rectify deadlock

C. to detect deadlock

D. to slove deadlock

What is the correct answer?

4

The primary purpose of an operating system is a …

A. To allow people to use the computer

B. To make the most efficient use of computer hardware

C. To make computer easier to use

D. To keep system programmer employed

What is the correct answer?

4

An unauthorized party inserts counterfeit objects into the system is called_________________

A. interruption

B. interception

C. fabrication

D. modification

What is the correct answer?

4

Which of the following is suitable after you install new drivers?

A. Hibernate

B. Sleep

C. Restart

D. Shut Down

What is the correct answer?

4

Recently deleted files are stored in

A. Taskbar

B. Desktop

C. My computer

D. Recycle bin

What is the correct answer?

4

Which one is true for unconditional disk formatting?

A. Transfer system files after format

B. Do not check/scan surface after format

C. Destroys every byte of data on a disk by overwriting it with with blank spaces

D. All of above

What is the correct answer?

4

RPN stands for

A. Reverse Polish Notation

B. Record Police Notation

C. Record Polish Notation

D. Reverse Police Negation

What is the correct answer?

4

In case of modification an unauthorized party not only gains access to but tampers with an asset. This is an attack on ____________________.

A. availability

B. confidentiality

C. integrity

D. authenticity

What is the correct answer?

4

In case of ____________________transparency a file can transparently move to another server.

A. Location

B. Migration

C. Replication

D. Concurrency

What is the correct answer?

4

The name services of DCE include ________

A. the Cell Directory Service

B. the Global Directory Service

C. the Global Directory Agent

D. A,B and C

What is the correct answer?

4

_________, as a feature of good distributed file system, clients should be able to continue working if a file server crashes. Likewise, data must not be lost and a restarted file server must be able to recover to a valid state.

A. Scalability

B. Reliability

C. Flexibility

D. Fault tolerance

What is the correct answer?

4

In the case of____________, message remains in the senders address space until the receiver executes the corresponding receive.

A. No buffering

B. Single message buffering

C. Unbounded-capacity buffer

D. Finite bound buffer

What is the correct answer?

4

______________ are popular way to improve application through parallelism.

A. Processes

B. Threads

C. Context switching

D. none of these

What is the correct answer?

4

______________approach simplifies debugging and system verification.

A. Kernel

B. Layered

C. Extended

D. Virtual machine

What is the correct answer?

4

Which of the following does not occur during the power-on-self-test (POST)?

A. The scandisk utility begins to run

B. The video card and video memory are tested

C. The BIOS identification process occurs

D. Memory chip are checked to ensure that they are working properly

What is the correct answer?

4

What do you mean by 0-reliable level in multicast communication?

A. Multiple responses is expected from any receivers.

B. No response is expected from any receivers.

C. Multiple responses is expected from multiple receivers.

D. A multicast message is received by all the members of the group or none.

What is the correct answer?

4

Most accurate global time is based on oscillations of the ______________

A. Cesium-130 atom

B. Cesium-133 atom

C. Cesium-136 atom

D. Cesium-139 atom

What is the correct answer?

4

To install the new font

A. Start -> setting -> font

B. Start -> control panel -> font -> install new font

C. Start -> setting -> control panel -> font -> install new font

D. Start -> setting -> control panel -> font

What is the correct answer?

4

______________ refers to the technology in which some space in hard disk is used as an extension of main memory.

A. Cache memory

B. Paging

C. Virtual memory

D. Associative memory

What is the correct answer?

4

A _____________is a collection of processors that do not share memory, peripheral devices,or a clock.

A. Computer system

B. distributed system

C. network

D. None of the above

What is the correct answer?

4

Having data belonging to two independent processes in the same page is called____________.

A. Buffering

B. Blocking

C. Message-passing

D. False sharing

What is the correct answer?

4

Pick the wrong statement from the following.

A. UNIX systems originally came with a command interpreter called the Bourne Shell.

B. The cat command takes any characters from standard input, and then echoes them to standard output.

C. A pipe is a means of taking the output of one command and directing it as another command.

D. The manual entry is called a man page, even though it is often more than one page long.

What is the correct answer?

4

______________is a mechanism the prevents two or more processes from accessing a shared resource simultaneously.

A. Livelock

B. Preemption

C. Semaphore

D. either or