Home
Current Affairs January 2024

What is the correct answer?

4

The two sub systems of user mode layer of windows 2000 are _________ and __________

A. excel, executive

B. environment, integral

C. orbit , kernel

D. Kernel , executive

Correct Answer :

B. environment, integral


Related Questions

What is the correct answer?

4

Most accurate global time is based on oscillations of the ______________

A. Cesium-130 atom

B. Cesium-133 atom

C. Cesium-136 atom

D. Cesium-139 atom

What is the correct answer?

4

You can use print manage window

A. To cancel the print job

B. To check status of files in the print queue

C. To interrupt printing

D. All of the above

What is the correct answer?

4

The command used to create logical drive for specific location of disk

A. Format

B. Fdisk

C. Subst

D. All of the above

What is the correct answer?

4

A solution to starvation is _____________.

A. segmentation

B. Aging

C. Paging

D. virtual memory

What is the correct answer?

4

In _______, if a processor writes the value 100 to the memory location x, this write operation will only change the contents of its local memory and will not affect the contents of the memory of any other processor.

A. Tightly coupled systems,

B. Loosely coupled systems

C. Parallel processing systems

D. File management system

What is the correct answer?

4

An operating system version designed for use with a media center PC is Microsoft Windows XP

A. Media center edition

B. Home edition

C. Tablet PC edition

D. None of above

What is the correct answer?

4

____________approach can place the data directly into the memory or take the data directly from the memory without direct intervention from the processor.

A. DMA

B. Daisy chain arbitration

C. polling

D. none of these

What is the correct answer?

4

Choose the correct statement from the following.

A. In computer terminology, variables are symbols which stand for some value.

B. An alternative method for executing the commands in the file backup is to make the file as directory.

C. The restricted shell gives more control to the system administrator and restricts the options of the user.

D. The decision making done by computer programs is in the form of conditional execution.

What is the correct answer?

4

______________ selects a process from among the ready processes to execute on the CPU.

A. CPU Scheduler

B. Loader

C. Dispatcher

D. Compiler

What is the correct answer?

4

The name services of DCE include ________

A. the Cell Directory Service

B. the Global Directory Service

C. the Global Directory Agent

D. A,B and C

What is the correct answer?

4

A small part of taskbar that has icons of background running applications is

A. Start button

B. Quick launch

C. Task bar

D. System tray

What is the correct answer?

4

In Multics, a process could have up to 256K segments, but each segment was limited to ___________ 64K words.

A. 64K

B. 32K

C. 1024K

D. 112K

What is the correct answer?

4

In case of modification an unauthorized party not only gains access to but tampers with an asset. This is an attack on ____________________.

A. availability

B. confidentiality

C. integrity

D. authenticity

What is the correct answer?

4

To install the new font

A. Start -> setting -> font

B. Start -> control panel -> font -> install new font

C. Start -> setting -> control panel -> font -> install new font

D. Start -> setting -> control panel -> font

What is the correct answer?

4

When a child dies, it sends a _______________signal to its parent.

A. SIGCHLD

B. EDEADLK

C. WNOHANG

D. SEDECHLD

What is the correct answer?

4

Which command is used to display the contents of the text file of DOS?

A. Copy

B. Copy con

C. Dir

D. Type

What is the correct answer?

4

A _______________in a distributed system is a string of bits or characters that is used to refer to an entity.

A. name

B. attribute

C. identifiers

D. addresses

What is the correct answer?

4

All of the following are TRUE regarding virtual memory EXCEPT

A. Any amount of RAM can be allocated to virtual memory

B. The setting for the amount of hard disk drive space to allocate virtual memory can be manually change

C. This temporary storage is called the swap file or page file

D. Virtual memory is the physical space o the hard drive

What is the correct answer?

4

Which components appear in the initial Windows start up display?

A. Start menu

B. Dialog boxes

C. Taskbar

D. All of above

What is the correct answer?

4

In Windows, start button is used to

A. Device setting

B. Run applications

C. All of above

D. Turn off the system

What is the correct answer?

4

____________ file system allows sharing in multiple different locations grouped under one folder.

A. Direct

B. distributed

C. sequential

D. parallel

What is the correct answer?

4

An unauthorized party inserts counterfeit objects into the system is called_________________

A. interruption

B. interception

C. fabrication

D. modification

What is the correct answer?

4

In case of good process migration mechanism, _____________ means failure of any node other than the one on which the process is running should not affect the execution of the process.

A. Robustness

B. Efficiency

C. Transparent

D. Interference

What is the correct answer?

4

A process is _________________

A. program in main memory

B. Program in cache memory

C. program in secondary storage

D. program in execution

What is the correct answer?

4

Which of the following operating system reads and reacts in actual time?

A. Quick Response System

B. Time Sharing System

C. Batch Processing System

D. Real Time System

What is the correct answer?

4

Which one is true for unconditional disk formatting?

A. Transfer system files after format

B. Do not check/scan surface after format

C. Destroys every byte of data on a disk by overwriting it with with blank spaces

D. All of above

What is the correct answer?

4

In_________________ model, when a process does a release access, the contents of all the modifications are not immediately sent to other nodes but they are sent only on demand.

A. Release Consistency Model

B. Lazy Release consistency model

C. Weak Consistency Model

D. Processor Consistency Model

What is the correct answer?

4

The two sub systems of user mode layer of windows 2000 are _________ and __________

A. excel, executive

B. environment, integral

C. orbit , kernel

D. Kernel , executive

What is the correct answer?

4

What is Dr. Watson?

A. IT Expert

B. Diagnosis tool

C. Surgeon

D. None

What is the correct answer?

4

The operating system is the most common type of ___ Software

A. System

B. Application

C. Word processing software

D. Communication