Home
Current Affairs January 2024

What is the correct answer?

4

The operating system is the most common type of ___ Software

A. System

B. Application

C. Word processing software

D. Communication

Correct Answer :

A. System


Related Questions

What is the correct answer?

4

Whenever you move a directory from one location to another

A. The directory is moved the source file is not moved

B. All the subdirectory inside that directory are moved

C. All files inside the directory are moved

D. Both b and c

What is the correct answer?

4

Process migration involves__________________

A. Selection of a process to be migrated

B. Selection of destination system or node

C. Actual transfer of the selected process to the destination system or node

D. All A, B, C

What is the correct answer?

4

DSM stands for______________

A. Direct shared memory

B. Direct system memory

C. Distributed shared memory

D. Distributed system memory

What is the correct answer?

4

What is the function of radio button?

A. To select multiple option

B. To select single option

C. To select all option

D. All of above

What is the correct answer?

4

When resources have multiple instances ________ is used for deadlock Avoidance.

A. Bankers algorithm

B. Resource Allocation Graph

C. semaphores

D. all of these

What is the correct answer?

4

IPC stands for _________

A. Integrated parallel communication

B. Intermediate process call

C. Internal program call

D. Inter process communication

What is the correct answer?

4

All of the following are TRUE regarding virtual memory EXCEPT

A. Any amount of RAM can be allocated to virtual memory

B. The setting for the amount of hard disk drive space to allocate virtual memory can be manually change

C. This temporary storage is called the swap file or page file

D. Virtual memory is the physical space o the hard drive

What is the correct answer?

4

The date and time displays on

A. Taskbar

B. Launch pad

C. Status bar

D. System tray

What is the correct answer?

4

Identify the distributed computing model from the following statement. In this model, the user's processes need not be migrated to the server machines for getting the work done by those machines.

A. Minicomputer model

B. Workstation model

C. Workstation-Server model

D. Processor pool model

What is the correct answer?

4

The problem with logical dumping is ________________

A. very costly

B. very slow

C. human errors

D. all of these

What is the correct answer?

4

Creation of a semaphore set is done using the _______system call.

A. semget()

B. semsget()

C. mknod()

D. sempget()

What is the correct answer?

4

A standard UNIX system includes a set of ___________ and a set of ___________.

A. Commands ,files

B. Libraries, Applications

C. Libraries, files

D. Files, Applications

What is the correct answer?

4

RPN stands for

A. Reverse Polish Notation

B. Record Police Notation

C. Record Polish Notation

D. Reverse Police Negation

What is the correct answer?

4

Transparent RPC mechanism refers to :

A. Existance of multuple computer visible and a provide a single system image to its users.

B. It runs the program transparently.

C. It is a technique to shift the program to other computer.

D. It is technique in which local procedures and remote procedures are indistinguishable to programmers.

What is the correct answer?

4

Initialization of I/O devices is part of the_________.

A. CPU

B. MSDOS

C. UNIX kernel

D. None of the above

What is the correct answer?

4

Which one is true for unconditional disk formatting?

A. Transfer system files after format

B. Do not check/scan surface after format

C. Destroys every byte of data on a disk by overwriting it with with blank spaces

D. All of above

What is the correct answer?

4

_________, as a feature of good distributed file system, clients should be able to continue working if a file server crashes. Likewise, data must not be lost and a restarted file server must be able to recover to a valid state.

A. Scalability

B. Reliability

C. Flexibility

D. Fault tolerance

What is the correct answer?

4

The two sub systems of user mode layer of windows 2000 are _________ and __________

A. excel, executive

B. environment, integral

C. orbit , kernel

D. Kernel , executive

What is the correct answer?

4

Windows 2000 supports -------------- type of file system

A. NTFS

B. EFS

C. FEFS

D. EFFS

What is the correct answer?

4

When a child dies, it sends a _______________signal to its parent.

A. SIGCHLD

B. EDEADLK

C. WNOHANG

D. SEDECHLD

What is the correct answer?

4

Because the I/O devices are not synchronized with the CPU, some information must be exchanged between the CPU and the device to ensure that the data is received reliably. This interaction between the CPU and an I/O device is usually referred to as ____________

A. polling

B. arbitration

C. handshaking

D. interrupting

What is the correct answer?

4

Identify the server:
This type of server generally remains in existence indefinitely. It is shared by many clients. Servers of this type are created and installed before the clients use them.

A. Instance-per-call-servers

B. Persistent Servers

C. Non-Persistent Servers

D. Semantic server

What is the correct answer?

4

In case of ____________________transparency a file can transparently move to another server.

A. Location

B. Migration

C. Replication

D. Concurrency

What is the correct answer?

4

Load balancing algorithms in ______________ class use the processor and process characteristics to allocate processes to nodes.

A. Static

B. Dynamic

C. Deterministic

D. Probabilistic

What is the correct answer?

4

An unauthorized party inserts counterfeit objects into the system is called_________________

A. interruption

B. interception

C. fabrication

D. modification

What is the correct answer?

4

The controller can access memory in memory cycles which are not used by the particular bank of memory into which the DMA controller is writing data. This approach, called _________

A. interrupting

B. cycle stealing

C. swapping

D. paging

What is the correct answer?

4

Bootstrapping is also known as ______

A. cold-hot boot

B. hot boot

C. hot strap

D. cold boot

What is the correct answer?

4

Which of the following is an essential file of a MS-DOS boot disk?

A. COMMANCOM

B. START.COM

C. VER.COM

D. TREE.COM

What is the correct answer?

4

Choose the correct statement from the following.

A. In computer terminology, variables are symbols which stand for some value.

B. An alternative method for executing the commands in the file backup is to make the file as directory.

C. The restricted shell gives more control to the system administrator and restricts the options of the user.

D. The decision making done by computer programs is in the form of conditional execution.

What is the correct answer?

4

In case of good process migration mechanism, _____________ means failure of any node other than the one on which the process is running should not affect the execution of the process.

A. Robustness

B. Efficiency

C. Transparent

D. Interference