Home
Current Affairs January 2024

What is the correct answer?

4

Which of the following operating system reads and reacts in actual time?

A. Quick Response System

B. Time Sharing System

C. Batch Processing System

D. Real Time System

Correct Answer :

D. Real Time System


Related Questions

What is the correct answer?

4

In_________________ model, when a process does a release access, the contents of all the modifications are not immediately sent to other nodes but they are sent only on demand.

A. Release Consistency Model

B. Lazy Release consistency model

C. Weak Consistency Model

D. Processor Consistency Model

What is the correct answer?

4

When a peripheral device needs immediate attention from the operating system, it generates a(n)

A. Page file

B. Spool

C. Stack

D. Interrupt

What is the correct answer?

4

IDL stands for_____________________

A. Integrated Data library

B. Isolated Data Library

C. Interface Data Language

D. Interface Definition Language

What is the correct answer?

4

Creation of a semaphore set is done using the _______system call.

A. semget()

B. semsget()

C. mknod()

D. sempget()

What is the correct answer?

4

Which of the following is not essential to shut down your computer?

A. XCOPY

B. Edit

C. Sys

D. None of the above

What is the correct answer?

4

A shared memory segment first needs to be allocated (create, using the__________ system call.

A. semget()

B. msgrcv()

C. shmget()

D. mknod()

What is the correct answer?

4

Bootstrapping is also known as ______

A. cold-hot boot

B. hot boot

C. hot strap

D. cold boot

What is the correct answer?

4

Process migration involves__________________

A. Selection of a process to be migrated

B. Selection of destination system or node

C. Actual transfer of the selected process to the destination system or node

D. All A, B, C

What is the correct answer?

4

Fsck conducts a check in _____ phases

A. One

B. Two

C. Five

D. Eight

What is the correct answer?

4

The date and time displays on

A. Taskbar

B. Launch pad

C. Status bar

D. System tray

What is the correct answer?

4

In _______, if a processor writes the value 100 to the memory location x, this write operation will only change the contents of its local memory and will not affect the contents of the memory of any other processor.

A. Tightly coupled systems,

B. Loosely coupled systems

C. Parallel processing systems

D. File management system

What is the correct answer?

4

__ is the program run on a computer when the computer boots up

A. System software

B. Operating system

C. System operations

D. None

What is the correct answer?

4

The _________takes any characters from standard input, and then echoes them to standard output.

A. kill character

B. cat command

C. cate command

D. control command

What is the correct answer?

4

The Bankers algorithm is used

A. to prevent deadlock

B. to rectify deadlock

C. to detect deadlock

D. to slove deadlock

What is the correct answer?

4

A process is already split into pieces, called________________.

A. Tasks

B. Program

C. Processors

D. Routines

What is the correct answer?

4

Which of the following does not occur during the power-on-self-test (POST)?

A. The scandisk utility begins to run

B. The video card and video memory are tested

C. The BIOS identification process occurs

D. Memory chip are checked to ensure that they are working properly

What is the correct answer?

4

Ext2 is the standard file system of _______ and uses a block size of_____bytes

A. MS DOS,8K

B. Linux ,1024

C. Linux, 512

D. Unix, 512

What is the correct answer?

4

In case of ____________________transparency a file can transparently move to another server.

A. Location

B. Migration

C. Replication

D. Concurrency

What is the correct answer?

4

Which of the following is suitable after you install new drivers?

A. Hibernate

B. Sleep

C. Restart

D. Shut Down

What is the correct answer?

4

What do you mean by 0-reliable level in multicast communication?

A. Multiple responses is expected from any receivers.

B. No response is expected from any receivers.

C. Multiple responses is expected from multiple receivers.

D. A multicast message is received by all the members of the group or none.

What is the correct answer?

4

The _____________ are based on modification of the original message in some manner, or on creation of a false message.

A. Passive attack

B. Release of message content attack

C. Traffic analysis attack

D. Active attack

What is the correct answer?

4

Pick the wrong statement from the following.

A. UNIX systems originally came with a command interpreter called the Bourne Shell.

B. The cat command takes any characters from standard input, and then echoes them to standard output.

C. A pipe is a means of taking the output of one command and directing it as another command.

D. The manual entry is called a man page, even though it is often more than one page long.

What is the correct answer?

4

____________ file system allows sharing in multiple different locations grouped under one folder.

A. Direct

B. distributed

C. sequential

D. parallel

What is the correct answer?

4

The two sub systems of user mode layer of windows 2000 are _________ and __________

A. excel, executive

B. environment, integral

C. orbit , kernel

D. Kernel , executive

What is the correct answer?

4

A process control block contains varies attributes required by _____________ to control a process.

A. RAM

B. virtual memory

C. BIOS

D. Operating System

What is the correct answer?

4

Once text has been cut to the clipboard, you can____hat text into another document

A. Copy

B. Paste

C. Transfer

D. None of the above

What is the correct answer?

4

To install the new font

A. Start -> setting -> font

B. Start -> control panel -> font -> install new font

C. Start -> setting -> control panel -> font -> install new font

D. Start -> setting -> control panel -> font

What is the correct answer?

4

A _______________in a distributed system is a string of bits or characters that is used to refer to an entity.

A. name

B. attribute

C. identifiers

D. addresses

What is the correct answer?

4

___________variable is not automatically created on all UNIX systems but is used by so many programs that it is considered a standard environment variable.

A. IFS

B. MAIL

C. TERM

D. PATH

What is the correct answer?

4

A process is _________________

A. program in main memory

B. Program in cache memory

C. program in secondary storage

D. program in execution