Home
Current Affairs January 2024

What is the correct answer?

4

SRM stands for

A. Security Resource Manager

B. Secret Resource Manager

C. Security Reference Monitor

D. Security Reference Manual

Correct Answer :

C. Security Reference Monitor


Related Questions

What is the correct answer?

4

In the case of____________ , changes to an open file are only locally visible.

A. session semantics

B. immutable files

C. atomic transactions

D. None of the above.

What is the correct answer?

4

______________ occurs when multiple processes or threads read and write data items so that the final result depends on the order of execution of instructions in the multiple processes.

A. Race condition

B. Mutual exclusion

C. Exception

D. Interrupt

What is the correct answer?

4

_______refers to the block size of the DSM system, i.e. to the units of sharing and the unit of data transfer across the network when a network block fault occurs.

A. Granularity

B. Coherence

C. Abstraction

D. Synchronization

What is the correct answer?

4

_____________typically contains temporary data such as subroutine parameter, return address, and temporary variables.

A. Current value of Program Counter

B. Value of the variables

C. The process stack

D. A data section

What is the correct answer?

4

Which of the following is/are external commands?

A. Edit

B. Label

C. Sys

D. All of above

What is the correct answer?

4

___________variable is not automatically created on all UNIX systems but is used by so many programs that it is considered a standard environment variable.

A. IFS

B. MAIL

C. TERM

D. PATH

What is the correct answer?

4

Which one is true for unconditional disk formatting?

A. Transfer system files after format

B. Do not check/scan surface after format

C. Destroys every byte of data on a disk by overwriting it with with blank spaces

D. All of above

What is the correct answer?

4

The maximum size of a write file is limited to only

A. Name of the file

B. Extension of the file

C. The amount of memory in your computer

D. All of above

What is the correct answer?

4

_______________refers to a strategy where whenever a resource is requested, it is only granted if it cannot result in deadlock.

A. Deadlock Prevention

B. Livelock

C. Deadlock avoidance

D. none of these

What is the correct answer?

4

A shared memory segment first needs to be allocated (create, using the__________ system call.

A. semget()

B. msgrcv()

C. shmget()

D. mknod()

What is the correct answer?

4

Two clocks are said to be synchronized at a particular instance of time if the difference in time values of the two clocks is less than some specified constant. The difference in time values of two clocks is called ___________.

A. Interrupt

B. Clock Frequency

C. Clock Ticks

D. Clock Skew

What is the correct answer?

4

The operating system is the most common type of ___ Software

A. System

B. Application

C. Word processing software

D. Communication

What is the correct answer?

4

Process migration involves__________________

A. Selection of a process to be migrated

B. Selection of destination system or node

C. Actual transfer of the selected process to the destination system or node

D. All A, B, C

What is the correct answer?

4

All of the following are TRUE regarding virtual memory EXCEPT

A. Any amount of RAM can be allocated to virtual memory

B. The setting for the amount of hard disk drive space to allocate virtual memory can be manually change

C. This temporary storage is called the swap file or page file

D. Virtual memory is the physical space o the hard drive

What is the correct answer?

4

The ______________ unpacks the call receipt messages from local RPC Runtime and makes a perfect local call to invoke the appropriate procedure in the server.

A. server Stub

B. server

C. client

D. client stub

What is the correct answer?

4

A process is _________________

A. program in main memory

B. Program in cache memory

C. program in secondary storage

D. program in execution

What is the correct answer?

4

____________ file system allows sharing in multiple different locations grouped under one folder.

A. Direct

B. distributed

C. sequential

D. parallel

What is the correct answer?

4

In case of good process migration mechanism, _____________ means failure of any node other than the one on which the process is running should not affect the execution of the process.

A. Robustness

B. Efficiency

C. Transparent

D. Interference

What is the correct answer?

4

A sequence of instructions telling the computer what to do is called a_____________

A. program

B. language

C. translator

D. package

What is the correct answer?

4

A small part of taskbar that has icons of background running applications is

A. Start button

B. Quick launch

C. Task bar

D. System tray

What is the correct answer?

4

Which command is used to display the contents of the text file of DOS?

A. Copy

B. Copy con

C. Dir

D. Type

What is the correct answer?

4

The _________takes any characters from standard input, and then echoes them to standard output.

A. kill character

B. cat command

C. cate command

D. control command

What is the correct answer?

4

When a child dies, it sends a _______________signal to its parent.

A. SIGCHLD

B. EDEADLK

C. WNOHANG

D. SEDECHLD

What is the correct answer?

4

An option commonly takes the form of a _____followed by __________characters.

A. dot, one or more

B. dash, only one

C. dash, one or more

D. dot,only two

What is the correct answer?

4

When resources have multiple instances ________ is used for deadlock Avoidance.

A. Bankers algorithm

B. Resource Allocation Graph

C. semaphores

D. all of these

What is the correct answer?

4

______________ selects a process from among the ready processes to execute on the CPU.

A. CPU Scheduler

B. Loader

C. Dispatcher

D. Compiler

What is the correct answer?

4

In Windows, start button is used to

A. Device setting

B. Run applications

C. All of above

D. Turn off the system

What is the correct answer?

4

______________ is a situation in which two computer programs sharing the same resource are effectively preventing each other from accessing the resource, resulting in both programs ceasing to function.

A. Semaphore

B. Deadlock

C. Mutual Exclusion

D. No preemption

What is the correct answer?

4

_________, as a feature of good distributed file system, clients should be able to continue working if a file server crashes. Likewise, data must not be lost and a restarted file server must be able to recover to a valid state.

A. Scalability

B. Reliability

C. Flexibility

D. Fault tolerance

What is the correct answer?

4

An orphan process is automatically inherited by the _____and becomes a _______ of this process.

A. 'init' process, father

B. 'init' process, child

C. 'initial process, father

D. 'it' process, child