Home
Current Affairs January 2024

What is the correct answer?

4

_______refers to the block size of the DSM system, i.e. to the units of sharing and the unit of data transfer across the network when a network block fault occurs.

A. Granularity

B. Coherence

C. Abstraction

D. Synchronization

Correct Answer :

A. Granularity


Related Questions

What is the correct answer?

4

______________ are popular way to improve application through parallelism.

A. Processes

B. Threads

C. Context switching

D. none of these

What is the correct answer?

4

When copying more than one file at a time, you must specify an existing directory as the ___________

A. Source

B. Sub directory

C. Destination.

D. Path name

What is the correct answer?

4

In _______, if a processor writes the value 100 to the memory location x, this write operation will only change the contents of its local memory and will not affect the contents of the memory of any other processor.

A. Tightly coupled systems,

B. Loosely coupled systems

C. Parallel processing systems

D. File management system

What is the correct answer?

4

The command used to create logical drive for specific location of disk

A. Format

B. Fdisk

C. Subst

D. All of the above

What is the correct answer?

4

_________, as a feature of good distributed file system, clients should be able to continue working if a file server crashes. Likewise, data must not be lost and a restarted file server must be able to recover to a valid state.

A. Scalability

B. Reliability

C. Flexibility

D. Fault tolerance

What is the correct answer?

4

Objects location is found by _________________

A. Broadcasting

B. Encoding Location of objects within UID

C. Searching creator node first and then broadcasting

D. All A, B, C

What is the correct answer?

4

The ___ contains commands associated with the My Computer window

A. Start menu

B. Standard menu

C. System menu

D. None of the above

What is the correct answer?

4

In MS-DOS, the interfaces and levels of functionality are _______________

A. not well separated.

B. well separated

C. independent

D. dependent

What is the correct answer?

4

In___________, the requesting device or devices assert the signal bus_request.

A. Priority encoded arbitration

B. Distributed arbitration by self-selection

C. Priority arbitration

D. Daisy chain arbitration

What is the correct answer?

4

What do you mean by 0-reliable level in multicast communication?

A. Multiple responses is expected from any receivers.

B. No response is expected from any receivers.

C. Multiple responses is expected from multiple receivers.

D. A multicast message is received by all the members of the group or none.

What is the correct answer?

4

In ________________________ each node periodically sends a message to the time server.

A. Passive Time Server Centralized Algorithm

B. Active Time Server Centralized Algorithm

C. Global Averaging Distributed Algorithms

D. Localized Averaging Distributed Algorithms

What is the correct answer?

4

A process is already split into pieces, called________________.

A. Tasks

B. Program

C. Processors

D. Routines

What is the correct answer?

4

__________ deals with when a modified page should be written out to secondary memory.

A. Cleaning policy

B. Fetch policy

C. Frame locking

D. None

What is the correct answer?

4

The two sub systems of user mode layer of windows 2000 are _________ and __________

A. excel, executive

B. environment, integral

C. orbit , kernel

D. Kernel , executive

What is the correct answer?

4

A two-byte integer called ____________is interpreted as an index into an array of inodes in a fixed, known location on disk.

A. an inode

B. an inumber

C. an imap

D. an imark

What is the correct answer?

4

Bootstrapping is also known as ______

A. cold-hot boot

B. hot boot

C. hot strap

D. cold boot

What is the correct answer?

4

Wiretapping to capture data in a network is an example of ________________

A. interruption

B. interception

C. fabrication

D. modification

What is the correct answer?

4

Choose the correct statement from the following.

A. In computer terminology, variables are symbols which stand for some value.

B. An alternative method for executing the commands in the file backup is to make the file as directory.

C. The restricted shell gives more control to the system administrator and restricts the options of the user.

D. The decision making done by computer programs is in the form of conditional execution.

What is the correct answer?

4

___________variable is not automatically created on all UNIX systems but is used by so many programs that it is considered a standard environment variable.

A. IFS

B. MAIL

C. TERM

D. PATH

What is the correct answer?

4

Which of the following operating system reads and reacts in actual time?

A. Quick Response System

B. Time Sharing System

C. Batch Processing System

D. Real Time System

What is the correct answer?

4

Once text has been cut to the clipboard, you can____hat text into another document

A. Copy

B. Paste

C. Transfer

D. None of the above

What is the correct answer?

4

_______________occurs when two or more execution flows are able to run simultaneously.

A. Deadlock

B. Concurrency

C. race condition

D. interrupt

What is the correct answer?

4

____________ file system allows sharing in multiple different locations grouped under one folder.

A. Direct

B. distributed

C. sequential

D. parallel

What is the correct answer?

4

In case of ____________________transparency a file can transparently move to another server.

A. Location

B. Migration

C. Replication

D. Concurrency

What is the correct answer?

4

A small part of taskbar that has icons of background running applications is

A. Start button

B. Quick launch

C. Task bar

D. System tray

What is the correct answer?

4

SRM stands for

A. Security Resource Manager

B. Secret Resource Manager

C. Security Reference Monitor

D. Security Reference Manual

What is the correct answer?

4

The algorithm should be scalable i.e. _____________.

A. The system should not enter a state in which nodes spend all their time migrating processes or exchanging control messages without doing any useful work.

B. The system should be able to handle small and large networked systems.

C. The algorithm should not be affected by the crash of one or more nodes in the system.

D. The process assignment decisions should be based on the current load of the system and not on some fixed static policy.

What is the correct answer?

4

______________ is a situation in which two computer programs sharing the same resource are effectively preventing each other from accessing the resource, resulting in both programs ceasing to function.

A. Semaphore

B. Deadlock

C. Mutual Exclusion

D. No preemption

What is the correct answer?

4

The usual su command syntax is

A. su-pwd

B. su-pd

C. su - userID

D. Sue- ID

What is the correct answer?

4

____ runs on a computer hardware and serves as a platform for other system to run on

A. System software

B. Operating system

C. Application system

D. All of above