Home
Current Affairs January 2024

What is the correct answer?

4

Transparent RPC mechanism refers to :

A. Existance of multuple computer visible and a provide a single system image to its users.

B. It runs the program transparently.

C. It is a technique to shift the program to other computer.

D. It is technique in which local procedures and remote procedures are indistinguishable to programmers.

Correct Answer :

D. It is technique in which local procedures and remote procedures are indistinguishable to programmers.


Related Questions

What is the correct answer?

4

A shared memory segment first needs to be allocated (create, using the__________ system call.

A. semget()

B. msgrcv()

C. shmget()

D. mknod()

What is the correct answer?

4

____ runs on a computer hardware and serves as a platform for other system to run on

A. System software

B. Operating system

C. Application system

D. All of above

What is the correct answer?

4

DSM stands for______________

A. Direct shared memory

B. Direct system memory

C. Distributed shared memory

D. Distributed system memory

What is the correct answer?

4

Identify the server:
This type of server generally remains in existence indefinitely. It is shared by many clients. Servers of this type are created and installed before the clients use them.

A. Instance-per-call-servers

B. Persistent Servers

C. Non-Persistent Servers

D. Semantic server

What is the correct answer?

4

A process is already split into pieces, called________________.

A. Tasks

B. Program

C. Processors

D. Routines

What is the correct answer?

4

Once text has been cut to the clipboard, you can____hat text into another document

A. Copy

B. Paste

C. Transfer

D. None of the above

What is the correct answer?

4

A standard UNIX system includes a set of ___________ and a set of ___________.

A. Commands ,files

B. Libraries, Applications

C. Libraries, files

D. Files, Applications

What is the correct answer?

4

When a child dies, it sends a _______________signal to its parent.

A. SIGCHLD

B. EDEADLK

C. WNOHANG

D. SEDECHLD

What is the correct answer?

4

The controller can access memory in memory cycles which are not used by the particular bank of memory into which the DMA controller is writing data. This approach, called _________

A. interrupting

B. cycle stealing

C. swapping

D. paging

What is the correct answer?

4

The Basic Input Output System (BIOS) resides in

A. RAM

B. ROM

C. The CPU

D. Memory Cache

What is the correct answer?

4

In ________________________ each node periodically sends a message to the time server.

A. Passive Time Server Centralized Algorithm

B. Active Time Server Centralized Algorithm

C. Global Averaging Distributed Algorithms

D. Localized Averaging Distributed Algorithms

What is the correct answer?

4

______________ selects a process from among the ready processes to execute on the CPU.

A. CPU Scheduler

B. Loader

C. Dispatcher

D. Compiler

What is the correct answer?

4

When resources have multiple instances ________ is used for deadlock Avoidance.

A. Bankers algorithm

B. Resource Allocation Graph

C. semaphores

D. all of these

What is the correct answer?

4

An operating system version designed for use with a media center PC is Microsoft Windows XP

A. Media center edition

B. Home edition

C. Tablet PC edition

D. None of above

What is the correct answer?

4

Fsck conducts a check in _____ phases

A. One

B. Two

C. Five

D. Eight

What is the correct answer?

4

What is dispatch latency?

A. The time taken by the dispatcher to stop one process and start another

B. The whole time taken by all processor

C. The time taken by the processor to write a file into disk

D. None of Above

What is the correct answer?

4

To install the new font

A. Start -> setting -> font

B. Start -> control panel -> font -> install new font

C. Start -> setting -> control panel -> font -> install new font

D. Start -> setting -> control panel -> font

What is the correct answer?

4

A page fault occurs when

A. the page is not found in the memory

B. the page is found in the memory

C. the Segmentation starts

D. the Deadlock happens

What is the correct answer?

4

__ is the program run on a computer when the computer boots up

A. System software

B. Operating system

C. System operations

D. None

What is the correct answer?

4

The usual su command syntax is

A. su-pwd

B. su-pd

C. su - userID

D. Sue- ID

What is the correct answer?

4

A two-byte integer called ____________is interpreted as an index into an array of inodes in a fixed, known location on disk.

A. an inode

B. an inumber

C. an imap

D. an imark

What is the correct answer?

4

The command used to create logical drive for specific location of disk

A. Format

B. Fdisk

C. Subst

D. All of the above

What is the correct answer?

4

One of the wonderful things about UNIX is its ___________names.

A. Unlimited path

B. Unlimited directory

C. Limited path

D. Limited file

What is the correct answer?

4

The operating system is the most common type of ___ Software

A. System

B. Application

C. Word processing software

D. Communication

What is the correct answer?

4

What is the function of radio button?

A. To select multiple option

B. To select single option

C. To select all option

D. All of above

What is the correct answer?

4

A process is _________________

A. program in main memory

B. Program in cache memory

C. program in secondary storage

D. program in execution

What is the correct answer?

4

The ______________ unpacks the call receipt messages from local RPC Runtime and makes a perfect local call to invoke the appropriate procedure in the server.

A. server Stub

B. server

C. client

D. client stub

What is the correct answer?

4

Which of the following is drop down list?

A. Combo box

B. List

C. Text area

D. None

What is the correct answer?

4

Because the I/O devices are not synchronized with the CPU, some information must be exchanged between the CPU and the device to ensure that the data is received reliably. This interaction between the CPU and an I/O device is usually referred to as ____________

A. polling

B. arbitration

C. handshaking

D. interrupting

What is the correct answer?

4

Having data belonging to two independent processes in the same page is called____________.

A. Buffering

B. Blocking

C. Message-passing

D. False sharing