Home
Current Affairs January 2024

What is the correct answer?

4

Which of the following is an essential file of a MS-DOS boot disk?

A. COMMANCOM

B. START.COM

C. VER.COM

D. TREE.COM

Correct Answer :

A. COMMANCOM


Related Questions

What is the correct answer?

4

A program to be executed must be in ---------------

A. main memory

B. secondary memory

C. virtual memory

D. Read only memory

What is the correct answer?

4

A SCSI device can transfer up to----------- of information per second.

A. 40 Mbytes

B. 60 Mbytes

C. 40 Gbytes

D. 60 Gbytes

What is the correct answer?

4

Which of the following is/are external commands?

A. Edit

B. Label

C. Sys

D. All of above

What is the correct answer?

4

Bootstrapping is also known as ______

A. cold-hot boot

B. hot boot

C. hot strap

D. cold boot

What is the correct answer?

4

____ runs on a computer hardware and serves as a platform for other system to run on

A. System software

B. Operating system

C. Application system

D. All of above

What is the correct answer?

4

The primary purpose of an operating system is a …

A. To allow people to use the computer

B. To make the most efficient use of computer hardware

C. To make computer easier to use

D. To keep system programmer employed

What is the correct answer?

4

A page fault occurs when

A. the page is not found in the memory

B. the page is found in the memory

C. the Segmentation starts

D. the Deadlock happens

What is the correct answer?

4

A sequence of instructions telling the computer what to do is called a_____________

A. program

B. language

C. translator

D. package

What is the correct answer?

4

What is the function of radio button?

A. To select multiple option

B. To select single option

C. To select all option

D. All of above

What is the correct answer?

4

Transparent RPC mechanism refers to :

A. Existance of multuple computer visible and a provide a single system image to its users.

B. It runs the program transparently.

C. It is a technique to shift the program to other computer.

D. It is technique in which local procedures and remote procedures are indistinguishable to programmers.

What is the correct answer?

4

The Basic Input Output System (BIOS) resides in

A. RAM

B. ROM

C. The CPU

D. Memory Cache

What is the correct answer?

4

In Multics, a process could have up to 256K segments, but each segment was limited to ___________ 64K words.

A. 64K

B. 32K

C. 1024K

D. 112K

What is the correct answer?

4

The _________takes any characters from standard input, and then echoes them to standard output.

A. kill character

B. cat command

C. cate command

D. control command

What is the correct answer?

4

When you start up the computer the boot up storage at which the BIOS versions manufacturer and data are displayed on the monitor is called

A. Bootstrap

B. System configuration

C. Power on self test (POST)

D. Kernel loading

What is the correct answer?

4

The essential difference between an operating system like Linux and one like Windows is that

A. Linux is a proprietary whereas Windows is not

B. Windows can run with an Intel processor, whereas Linux cannot

C. There are multiple versions of Linux, but only one version of Windows

D. Any programmer can modify Linux code which is not permitted with Windows

What is the correct answer?

4

Choose the correct statement from the following.

A. In computer terminology, variables are symbols which stand for some value.

B. An alternative method for executing the commands in the file backup is to make the file as directory.

C. The restricted shell gives more control to the system administrator and restricts the options of the user.

D. The decision making done by computer programs is in the form of conditional execution.

What is the correct answer?

4

An unauthorized party inserts counterfeit objects into the system is called_________________

A. interruption

B. interception

C. fabrication

D. modification

What is the correct answer?

4

In _______, if a processor writes the value 100 to the memory location x, this write operation will only change the contents of its local memory and will not affect the contents of the memory of any other processor.

A. Tightly coupled systems,

B. Loosely coupled systems

C. Parallel processing systems

D. File management system

What is the correct answer?

4

In case of good process migration mechanism, _____________ means failure of any node other than the one on which the process is running should not affect the execution of the process.

A. Robustness

B. Efficiency

C. Transparent

D. Interference

What is the correct answer?

4

Once text has been cut to the clipboard, you can____hat text into another document

A. Copy

B. Paste

C. Transfer

D. None of the above

What is the correct answer?

4

Load balancing algorithms in ______________ class use the processor and process characteristics to allocate processes to nodes.

A. Static

B. Dynamic

C. Deterministic

D. Probabilistic

What is the correct answer?

4

What is Dr. Watson?

A. IT Expert

B. Diagnosis tool

C. Surgeon

D. None

What is the correct answer?

4

Find out the characteristics of System-oriented names:

A. They are large integers or bit strings.

B. They are of the same size

C. Generally shorter than human-oriented names and are easy for manipulations like hashing, sorting and so on.

D. All A, B, C

What is the correct answer?

4

The algorithm should be scalable i.e. _____________.

A. The system should not enter a state in which nodes spend all their time migrating processes or exchanging control messages without doing any useful work.

B. The system should be able to handle small and large networked systems.

C. The algorithm should not be affected by the crash of one or more nodes in the system.

D. The process assignment decisions should be based on the current load of the system and not on some fixed static policy.

What is the correct answer?

4

The ______________ unpacks the call receipt messages from local RPC Runtime and makes a perfect local call to invoke the appropriate procedure in the server.

A. server Stub

B. server

C. client

D. client stub

What is the correct answer?

4

When a peripheral device needs immediate attention from the operating system, it generates a(n)

A. Page file

B. Spool

C. Stack

D. Interrupt

What is the correct answer?

4

The usual su command syntax is

A. su-pwd

B. su-pd

C. su - userID

D. Sue- ID

What is the correct answer?

4

Underlined text, such as text and folder names is referred to as

A. Hyperlink

B. Menu

C. Source drive

D. None of these

What is the correct answer?

4

______________is responsible for allocating primary memory to processes and for assisting the programmer in loading and storing the contents of the primary memory.

A. Operating system

B. Memory manager

C. Database administrator

D. RAM

What is the correct answer?

4

____________ file system allows sharing in multiple different locations grouped under one folder.

A. Direct

B. distributed

C. sequential

D. parallel