Home
Current Affairs January 2024

What is the correct answer?

4

The _________takes any characters from standard input, and then echoes them to standard output.

A. kill character

B. cat command

C. cate command

D. control command

Correct Answer :

B. cat command


Related Questions

What is the correct answer?

4

An orphan process is automatically inherited by the _____and becomes a _______ of this process.

A. 'init' process, father

B. 'init' process, child

C. 'initial process, father

D. 'it' process, child

What is the correct answer?

4

Wiretapping to capture data in a network is an example of ________________

A. interruption

B. interception

C. fabrication

D. modification

What is the correct answer?

4

In ________________________ each node periodically sends a message to the time server.

A. Passive Time Server Centralized Algorithm

B. Active Time Server Centralized Algorithm

C. Global Averaging Distributed Algorithms

D. Localized Averaging Distributed Algorithms

What is the correct answer?

4

The ______________ unpacks the call receipt messages from local RPC Runtime and makes a perfect local call to invoke the appropriate procedure in the server.

A. server Stub

B. server

C. client

D. client stub

What is the correct answer?

4

The primary purpose of an operating system is a …

A. To allow people to use the computer

B. To make the most efficient use of computer hardware

C. To make computer easier to use

D. To keep system programmer employed

What is the correct answer?

4

In ____________ location policies a random node is polled to check its state and the task is transferred if it will not be overloaded; polling is continued until a suitable node is found.

A. Threshold

B. Shortest

C. Bidding

D. Pairing

What is the correct answer?

4

The problem with logical dumping is ________________

A. very costly

B. very slow

C. human errors

D. all of these

What is the correct answer?

4

The two sub systems of user mode layer of windows 2000 are _________ and __________

A. excel, executive

B. environment, integral

C. orbit , kernel

D. Kernel , executive

What is the correct answer?

4

Process migration involves__________________

A. Selection of a process to be migrated

B. Selection of destination system or node

C. Actual transfer of the selected process to the destination system or node

D. All A, B, C

What is the correct answer?

4

In Windows, start button is used to

A. Device setting

B. Run applications

C. All of above

D. Turn off the system

What is the correct answer?

4

Having data belonging to two independent processes in the same page is called____________.

A. Buffering

B. Blocking

C. Message-passing

D. False sharing

What is the correct answer?

4

An unauthorized party inserts counterfeit objects into the system is called_________________

A. interruption

B. interception

C. fabrication

D. modification

What is the correct answer?

4

In case of ____________________transparency a file can transparently move to another server.

A. Location

B. Migration

C. Replication

D. Concurrency

What is the correct answer?

4

Whenever you move a directory from one location to another

A. The directory is moved the source file is not moved

B. All the subdirectory inside that directory are moved

C. All files inside the directory are moved

D. Both b and c

What is the correct answer?

4

______________approach simplifies debugging and system verification.

A. Kernel

B. Layered

C. Extended

D. Virtual machine

What is the correct answer?

4

_____________typically contains temporary data such as subroutine parameter, return address, and temporary variables.

A. Current value of Program Counter

B. Value of the variables

C. The process stack

D. A data section

What is the correct answer?

4

In case of modification an unauthorized party not only gains access to but tampers with an asset. This is an attack on ____________________.

A. availability

B. confidentiality

C. integrity

D. authenticity

What is the correct answer?

4

Which one is true for unconditional disk formatting?

A. Transfer system files after format

B. Do not check/scan surface after format

C. Destroys every byte of data on a disk by overwriting it with with blank spaces

D. All of above

What is the correct answer?

4

A process is already split into pieces, called________________.

A. Tasks

B. Program

C. Processors

D. Routines

What is the correct answer?

4

Pick the wrong statement from the following.

A. UNIX systems originally came with a command interpreter called the Bourne Shell.

B. The cat command takes any characters from standard input, and then echoes them to standard output.

C. A pipe is a means of taking the output of one command and directing it as another command.

D. The manual entry is called a man page, even though it is often more than one page long.

What is the correct answer?

4

The operating system is the most common type of ___ Software

A. System

B. Application

C. Word processing software

D. Communication

What is the correct answer?

4

A standard UNIX system includes a set of ___________ and a set of ___________.

A. Commands ,files

B. Libraries, Applications

C. Libraries, files

D. Files, Applications

What is the correct answer?

4

When a peripheral device needs immediate attention from the operating system, it generates a(n)

A. Page file

B. Spool

C. Stack

D. Interrupt

What is the correct answer?

4

A shared memory segment first needs to be allocated (create, using the__________ system call.

A. semget()

B. msgrcv()

C. shmget()

D. mknod()

What is the correct answer?

4

A SCSI device can transfer up to----------- of information per second.

A. 40 Mbytes

B. 60 Mbytes

C. 40 Gbytes

D. 60 Gbytes

What is the correct answer?

4

You can use print manage window

A. To cancel the print job

B. To check status of files in the print queue

C. To interrupt printing

D. All of the above

What is the correct answer?

4

A solution to starvation is _____________.

A. segmentation

B. Aging

C. Paging

D. virtual memory

What is the correct answer?

4

__________ deals with when a modified page should be written out to secondary memory.

A. Cleaning policy

B. Fetch policy

C. Frame locking

D. None

What is the correct answer?

4

A process may create a new process by executing ___________system call.

A. init

B. fork

C. create

D. new

What is the correct answer?

4

_____________ manage the name spaces and binds an object to its location.

A. Name Server

B. Name agent

C. Context

D. Name resolution