Home
Current Affairs January 2024

What is the correct answer?

4

The problem with logical dumping is ________________

A. very costly

B. very slow

C. human errors

D. all of these

Correct Answer :

B. very slow


Related Questions

What is the correct answer?

4

A two-byte integer called ____________is interpreted as an index into an array of inodes in a fixed, known location on disk.

A. an inode

B. an inumber

C. an imap

D. an imark

What is the correct answer?

4

___________variable is not automatically created on all UNIX systems but is used by so many programs that it is considered a standard environment variable.

A. IFS

B. MAIL

C. TERM

D. PATH

What is the correct answer?

4

Which buffering strategy is used for implementing synchronous communication?

A. Single message buffer

B. Unbounded - Capacity buffer

C. Finite-Bound Buffer

D. All can be used.

What is the correct answer?

4

The primary purpose of an operating system is:

A. To allow people to use the computer,

B. To make the most efficient use of the computer hardware

C. To make computers easier to use

D. To keep systems programmers employed

What is the correct answer?

4

In layered approach each layer uses the functions and services of ------------------

A. kernel

B. lower-level layers

C. higher-level layers

D. all of these

What is the correct answer?

4

The usual su command syntax is

A. su-pwd

B. su-pd

C. su - userID

D. Sue- ID

What is the correct answer?

4

An unauthorized party inserts counterfeit objects into the system is called_________________

A. interruption

B. interception

C. fabrication

D. modification

What is the correct answer?

4

Which is the layer of a computer system between the hardware and the user program

A. Operating system

B. Operating environment

C. System environment

D. None

What is the correct answer?

4

Windows 2000 supports -------------- type of file system

A. NTFS

B. EFS

C. FEFS

D. EFFS

What is the correct answer?

4

The maximum size of a write file is limited to only

A. Name of the file

B. Extension of the file

C. The amount of memory in your computer

D. All of above

What is the correct answer?

4

Most accurate global time is based on oscillations of the ______________

A. Cesium-130 atom

B. Cesium-133 atom

C. Cesium-136 atom

D. Cesium-139 atom

What is the correct answer?

4

When a peripheral device needs immediate attention from the operating system, it generates a(n)

A. Page file

B. Spool

C. Stack

D. Interrupt

What is the correct answer?

4

Creation of a semaphore set is done using the _______system call.

A. semget()

B. semsget()

C. mknod()

D. sempget()

What is the correct answer?

4

_____________typically contains temporary data such as subroutine parameter, return address, and temporary variables.

A. Current value of Program Counter

B. Value of the variables

C. The process stack

D. A data section

What is the correct answer?

4

Pick the wrong statement from the following.

A. UNIX systems originally came with a command interpreter called the Bourne Shell.

B. The cat command takes any characters from standard input, and then echoes them to standard output.

C. A pipe is a means of taking the output of one command and directing it as another command.

D. The manual entry is called a man page, even though it is often more than one page long.

What is the correct answer?

4

Which of the following is suitable after you install new drivers?

A. Hibernate

B. Sleep

C. Restart

D. Shut Down

What is the correct answer?

4

The ______________ unpacks the call receipt messages from local RPC Runtime and makes a perfect local call to invoke the appropriate procedure in the server.

A. server Stub

B. server

C. client

D. client stub

What is the correct answer?

4

When copying more than one file at a time, you must specify an existing directory as the ___________

A. Source

B. Sub directory

C. Destination.

D. Path name

What is the correct answer?

4

In Windows, start button is used to

A. Device setting

B. Run applications

C. All of above

D. Turn off the system

What is the correct answer?

4

In case of modification an unauthorized party not only gains access to but tampers with an asset. This is an attack on ____________________.

A. availability

B. confidentiality

C. integrity

D. authenticity

What is the correct answer?

4

In case of ____________________transparency a file can transparently move to another server.

A. Location

B. Migration

C. Replication

D. Concurrency

What is the correct answer?

4

Which of the following is drop down list?

A. Combo box

B. List

C. Text area

D. None

What is the correct answer?

4

In Multics, a process could have up to 256K segments, but each segment was limited to ___________ 64K words.

A. 64K

B. 32K

C. 1024K

D. 112K

What is the correct answer?

4

A process is already split into pieces, called________________.

A. Tasks

B. Program

C. Processors

D. Routines

What is the correct answer?

4

Whenever you move a directory from one location to another

A. The directory is moved the source file is not moved

B. All the subdirectory inside that directory are moved

C. All files inside the directory are moved

D. Both b and c

What is the correct answer?

4

Find out the characteristics of System-oriented names:

A. They are large integers or bit strings.

B. They are of the same size

C. Generally shorter than human-oriented names and are easy for manipulations like hashing, sorting and so on.

D. All A, B, C

What is the correct answer?

4

You can move a window to a different position on your screen by dragging it by its

A. Tail

B. Move handle

C. Status bar

D. Title bar

What is the correct answer?

4

______________is responsible for allocating primary memory to processes and for assisting the programmer in loading and storing the contents of the primary memory.

A. Operating system

B. Memory manager

C. Database administrator

D. RAM

What is the correct answer?

4

The _____________ are based on modification of the original message in some manner, or on creation of a false message.

A. Passive attack

B. Release of message content attack

C. Traffic analysis attack

D. Active attack

What is the correct answer?

4

Which of the following is not essential to shut down your computer?

A. XCOPY

B. Edit

C. Sys

D. None of the above