Home
Current Affairs January 2024

What is the correct answer?

4

What would you term includes entering new things, resigning those things which are not any more important, and adjusting the inquiry ascribes of things to improve the adequacy of search?

A. Repository Maintenance

B. Inventory Maintenance

C. Class Maintenance

D. Component Maintenance

Correct Answer :

A. Repository Maintenance


Repository maintenance includes entering new things, resigning those things which are not any more important, and adjusting the inquiry ascribes of things to improve the adequacy of search.

Related Questions

What is the correct answer?

4

Which of the following is a type of Software Maintenance in SDLC?

A. Corrective Maintenance

B. Adaptive Maintenance

C. Perfective Maintenance

D. All of the above

What is the correct answer?

4

What would you term the procedure that is successful in maintaining a prominent web interface to the storehouse?

A. Storehouse Maintenance

B. Searching

C. Web Interface Model

D. None of the Above

What is the correct answer?

4

Which of the Freedoms gives the user the right to study the working of the software and allows user to change it accordingly?

A. Freedom 0

B. Freedom 1

C. Freedom 2

D. Freedom 3

What is the correct answer?

4

Which of the Freedoms gives the user the right to distribute the modified versions of the software and also is an extension of Freedom 2?

A. Freedom 0

B. Freedom 1

C. Freedom 2

D. Freedom 3

What is the correct answer?

4

Which of the criteria restricts the interoperable usage of a FREE AND OPEN STANDARD SOFTWARE?

A. Availability

B. Patents

C. No Agreements

D. No intentional secrets

What is the correct answer?

4

What all hardware components are required by a Linux to function properly. Select from the options below:

A. Hard Drive

B. CD-ROM Drive

C. Joystick

D. High-End Processors

What is the correct answer?

4

The no. of stages in an Open Source Development model are:

A. 6

B. 7

C. 8

D. 9

What is the correct answer?

4

Why should we classify components depending upon the characteristics of the same?
a) As to build up a viable ordering and capacity conspire.
b) So that it is easy to organize them.

A. Only 1

B. Only 2

C. Both 1 & 2

D. None of the above

What is the correct answer?

4

What do you understand from GNOME and KDE?

A. Linux Distribution

B. Command Lines

C. GUI Based Linux

D. File Framework

What is the correct answer?

4

Which of the following statements is true?
a) In Software Reengineering methodology reverse engineering cycle is followed.
b) In Software Reengineering methodology forward engineering cycle is followed.
Options:

A. Only i is true

B. Only ii is true

C. Both i and ii are true

D. None of them is true

What is the correct answer?

4

Which of the below is incorrect about Telnet?

A. Telnet is a client-server program often used in general

B. It provides you the portability of using software on a remote system

C. It can be used to transfer files

D. Telnet can be used for logging in from remote systems

What is the correct answer?

4

What is the appropriate term that should be used for software whose source code is available and the user can utilize it according to their needs?

A. Free Software

B. Open Source Software

C. Free and Open Source Software

D. Any of the above

What is the correct answer?

4

Select out the two unreliable features of Telnet.

A. Decoded Transmission of Data

B. Less no. of port access

C. Remote access

D. Telnet ports are often left open

What is the correct answer?

4

Which of the following is considered as one of the major drawbacks of Free and Open Source Software?

A. Free Dispersion of Software

B. Source Code Availability

C. Involvement of many developers

D. Dependence on unpaid volunteers

What is the correct answer?

4

What makes your Open Source Project successful once Released?

A. Community Involvement

B. Feedbacks

C. Documentation

D. Maintenance of the Project

What is the correct answer?

4

What do you call the technique of storing encrypted user passwords in Linux?

A. System Password Management

B. Shadow Password

C. Encrypted Password

D. None of these

What is the correct answer?

4

What are the major factors that affect software maintenance?
a) Degree of change in the functionalities & Cost of maintenance
b) Dangers in undertaking any actions or updating
c) Team working on it
d) No. of Employees on the client side
Options:

A. Only 1

B. 1 & 2 Both

C. 3 & 4 Both

D. All of the above

What is the correct answer?

4

What is the least amount of memory you would require to run a Linux?

A. 2 Megabyte (Mb)

B. 4 Megabyte (Mb)

C. 16 Megabyte (Mb)

D. 64 Megabyte (Mb)

What is the correct answer?

4

Which scheme would you choose to classify the components or would rather use the scheme to characterize the components?

A. Prieto-Diaz's classification scheme

B. COCOMO

C. Ricardo-Diaz's classification scheme

D. None of the Above

What is the correct answer?

4

Which of the following analysis methods come under Static Analysis Tools?

A. Code Walkthrough

B. Code Inspection

C. None of the Above

D. Both a. & b.

What is the correct answer?

4

Which of the following categories stand opposite to Free and Open Source Software? (Choose any two of the given options.)

A. Proprietary Software

B. Secondary Software

C. Closed Source Software

D. Virtual Source Software

What is the correct answer?

4

What would you term includes entering new things, resigning those things which are not any more important, and adjusting the inquiry ascribes of things to improve the adequacy of search?

A. Repository Maintenance

B. Inventory Maintenance

C. Class Maintenance

D. Component Maintenance

What is the correct answer?

4

Which of the following software maintenance process models is used when little changes are to be made in a software?

A. Primary model

B. Secondary model

C. Tertiary model

D. Any of the above

What is the correct answer?

4

Choose among the additional options to make your server more secure?

A. Keep an eye on unused ports

B. Update your Linux Distribution time to time

C. Connect to networks when required

D. Make Console Access Secure

What is the correct answer?

4

Which of the Freedoms gives the user the right to distribute the copies of a software?

A. Freedom 0

B. Freedom 1

C. Freedom 2

D. Freedom 3

What is the correct answer?

4

Full Form of SSH?

A. Server Secure Hub

B. Security in Server Hub

C. Secure Shell

D. Secure Server Hub

What is the correct answer?

4

In which of the program analysis, strategies require the program to be executed and its genuine conduct recorded?

A. Static Analysis Tools

B. Dynamic Analysis Tools

C. None of the above

D. Both 1. & 2.

What is the correct answer?

4

Who was the founder of Linux?

A. Linus Torvalds

B. IBM

C. Christopher Markin

D. Bill Gates

What is the correct answer?

4

When was Free and Open Source Software first seen in the market?

A. 1960-70

B. 1970-80

C. 1990-95

D. After 1995

What is the correct answer?

4

Which of the following software maintenance process models is used when major changes are to be made in a software?

A. Primary model

B. Secondary model

C. Tertiary model

D. Any of the above