Home
Current Affairs January 2024

What is the correct answer?

4

______________ refers to the technology in which some space in hard disk is used as an extension of main memory.

A. Cache memory

B. Paging

C. Virtual memory

D. Associative memory

Correct Answer :

C. Virtual memory


Related Questions

What is the correct answer?

4

___________variable is not automatically created on all UNIX systems but is used by so many programs that it is considered a standard environment variable.

A. IFS

B. MAIL

C. TERM

D. PATH

What is the correct answer?

4

Two clocks are said to be synchronized at a particular instance of time if the difference in time values of the two clocks is less than some specified constant. The difference in time values of two clocks is called ___________.

A. Interrupt

B. Clock Frequency

C. Clock Ticks

D. Clock Skew

What is the correct answer?

4

What do you mean by 0-reliable level in multicast communication?

A. Multiple responses is expected from any receivers.

B. No response is expected from any receivers.

C. Multiple responses is expected from multiple receivers.

D. A multicast message is received by all the members of the group or none.

What is the correct answer?

4

____ runs on a computer hardware and serves as a platform for other system to run on

A. System software

B. Operating system

C. Application system

D. All of above

What is the correct answer?

4

The Basic Input Output System (BIOS) resides in

A. RAM

B. ROM

C. The CPU

D. Memory Cache

What is the correct answer?

4

The algorithm should be scalable i.e. _____________.

A. The system should not enter a state in which nodes spend all their time migrating processes or exchanging control messages without doing any useful work.

B. The system should be able to handle small and large networked systems.

C. The algorithm should not be affected by the crash of one or more nodes in the system.

D. The process assignment decisions should be based on the current load of the system and not on some fixed static policy.

What is the correct answer?

4

One of the wonderful things about UNIX is its ___________names.

A. Unlimited path

B. Unlimited directory

C. Limited path

D. Limited file

What is the correct answer?

4

The time taken by the Dispatcher to stop one process and start another running is known as _________________.

A. Turnaround time

B. Dispatch Latency

C. Access time

D. Response time

What is the correct answer?

4

______________ are popular way to improve application through parallelism.

A. Processes

B. Threads

C. Context switching

D. none of these

What is the correct answer?

4

______________is responsible for allocating primary memory to processes and for assisting the programmer in loading and storing the contents of the primary memory.

A. Operating system

B. Memory manager

C. Database administrator

D. RAM

What is the correct answer?

4

The controller can access memory in memory cycles which are not used by the particular bank of memory into which the DMA controller is writing data. This approach, called _________

A. interrupting

B. cycle stealing

C. swapping

D. paging

What is the correct answer?

4

In MS-DOS, the interfaces and levels of functionality are _______________

A. not well separated.

B. well separated

C. independent

D. dependent

What is the correct answer?

4

A process is ____________________

A. A program in Execution.

B. An asynchronous activity.

C. The 'dispatchable' unit.

D. All A, B, C

What is the correct answer?

4

Which buffering strategy is used for implementing synchronous communication?

A. Single message buffer

B. Unbounded - Capacity buffer

C. Finite-Bound Buffer

D. All can be used.

What is the correct answer?

4

A sequence of instructions telling the computer what to do is called a_____________

A. program

B. language

C. translator

D. package

What is the correct answer?

4

A standard UNIX system includes a set of ___________ and a set of ___________.

A. Commands ,files

B. Libraries, Applications

C. Libraries, files

D. Files, Applications

What is the correct answer?

4

______________ occurs when multiple processes or threads read and write data items so that the final result depends on the order of execution of instructions in the multiple processes.

A. Race condition

B. Mutual exclusion

C. Exception

D. Interrupt

What is the correct answer?

4

In case of ________________the server automatically copies files to other servers after the files are written.

A. Explicit replication

B. Implicit replication

C. Lazy file replication

D. Group file replication

What is the correct answer?

4

The Network Time Protocol is similar to _______________algorithm in that synchronization is also performed using time servers and an attempt is made to correct for communication latencies.

A. Banker's

B. Divide and conquer's

C. Cristians

D. Xdelta's

What is the correct answer?

4

In the case of____________, message remains in the senders address space until the receiver executes the corresponding receive.

A. No buffering

B. Single message buffering

C. Unbounded-capacity buffer

D. Finite bound buffer

What is the correct answer?

4

Which components appear in the initial windows start up display?

A. Dialog box

B. Task bar

C. Start menu

D. All of the above

What is the correct answer?

4

A bar that inform you the available options in your computer, opened applications, background running applications and can be used to switch between applications quickly is

A. Menu bar

B. Tool bar

C. Status bar

D. Task bar

What is the correct answer?

4

Creation of a semaphore set is done using the _______system call.

A. semget()

B. semsget()

C. mknod()

D. sempget()

What is the correct answer?

4

The usual su command syntax is

A. su-pwd

B. su-pd

C. su - userID

D. Sue- ID

What is the correct answer?

4

The find command is different from most UNIX commands in that each of the argument expressions following the beginning path name is considered a _____________

A. action expression

B. Boolean expression.

C. Boolean constant

D. Search qualifiers

What is the correct answer?

4

SRM stands for

A. Security Resource Manager

B. Secret Resource Manager

C. Security Reference Monitor

D. Security Reference Manual

What is the correct answer?

4

Fsck conducts a check in _____ phases

A. One

B. Two

C. Five

D. Eight

What is the correct answer?

4

A shared memory segment first needs to be allocated (create, using the__________ system call.

A. semget()

B. msgrcv()

C. shmget()

D. mknod()

What is the correct answer?

4

What is dispatch latency?

A. The time taken by the dispatcher to stop one process and start another

B. The whole time taken by all processor

C. The time taken by the processor to write a file into disk

D. None of Above

What is the correct answer?

4

The _____________ are based on modification of the original message in some manner, or on creation of a false message.

A. Passive attack

B. Release of message content attack

C. Traffic analysis attack

D. Active attack