Home
Current Affairs January 2024

What is the correct answer?

4

Which one of the following statements is true?

A. The cat command cares which file it receives as input or where the input goes.

B. Relative pathnames begin with something other than the slash character

C. UNIX shells never remember their current working directory (CW.

D. The cat command interprets -X as an option character rather than a pathname.

Correct Answer :

B. Relative pathnames begin with something other than the slash character


Related Questions

What is the correct answer?

4

The two sub systems of user mode layer of windows 2000 are _________ and __________

A. excel, executive

B. environment, integral

C. orbit , kernel

D. Kernel , executive

What is the correct answer?

4

The ___ contains commands associated with the My Computer window

A. Start menu

B. Standard menu

C. System menu

D. None of the above

What is the correct answer?

4

The primary purpose of an operating system is:

A. To allow people to use the computer,

B. To make the most efficient use of the computer hardware

C. To make computers easier to use

D. To keep systems programmers employed

What is the correct answer?

4

A _____________is a collection of processors that do not share memory, peripheral devices,or a clock.

A. Computer system

B. distributed system

C. network

D. None of the above

What is the correct answer?

4

A small part of taskbar that has icons of background running applications is

A. Start button

B. Quick launch

C. Task bar

D. System tray

What is the correct answer?

4

A bar that inform you the available options in your computer, opened applications, background running applications and can be used to switch between applications quickly is

A. Menu bar

B. Tool bar

C. Status bar

D. Task bar

What is the correct answer?

4

Underlined text, such as text and folder names is referred to as

A. Hyperlink

B. Menu

C. Source drive

D. None of these

What is the correct answer?

4

In___________, the requesting device or devices assert the signal bus_request.

A. Priority encoded arbitration

B. Distributed arbitration by self-selection

C. Priority arbitration

D. Daisy chain arbitration

What is the correct answer?

4

__________ deals with when a modified page should be written out to secondary memory.

A. Cleaning policy

B. Fetch policy

C. Frame locking

D. None

What is the correct answer?

4

____ runs on a computer hardware and serves as a platform for other system to run on

A. System software

B. Operating system

C. Application system

D. All of above

What is the correct answer?

4

The essential difference between an operating system like Linux and one like Windows is that

A. Linux is a proprietary whereas Windows is not

B. Windows can run with an Intel processor, whereas Linux cannot

C. There are multiple versions of Linux, but only one version of Windows

D. Any programmer can modify Linux code which is not permitted with Windows

What is the correct answer?

4

An option commonly takes the form of a _____followed by __________characters.

A. dot, one or more

B. dash, only one

C. dash, one or more

D. dot,only two

What is the correct answer?

4

______________is a mechanism the prevents two or more processes from accessing a shared resource simultaneously.

A. Livelock

B. Preemption

C. Semaphore

D. either or

What is the correct answer?

4

_______refers to the block size of the DSM system, i.e. to the units of sharing and the unit of data transfer across the network when a network block fault occurs.

A. Granularity

B. Coherence

C. Abstraction

D. Synchronization

What is the correct answer?

4

___________variable is not automatically created on all UNIX systems but is used by so many programs that it is considered a standard environment variable.

A. IFS

B. MAIL

C. TERM

D. PATH

What is the correct answer?

4

A two-byte integer called ____________is interpreted as an index into an array of inodes in a fixed, known location on disk.

A. an inode

B. an inumber

C. an imap

D. an imark

What is the correct answer?

4

Pick the wrong statement from the following.

A. UNIX systems originally came with a command interpreter called the Bourne Shell.

B. The cat command takes any characters from standard input, and then echoes them to standard output.

C. A pipe is a means of taking the output of one command and directing it as another command.

D. The manual entry is called a man page, even though it is often more than one page long.

What is the correct answer?

4

In_________________ model, when a process does a release access, the contents of all the modifications are not immediately sent to other nodes but they are sent only on demand.

A. Release Consistency Model

B. Lazy Release consistency model

C. Weak Consistency Model

D. Processor Consistency Model

What is the correct answer?

4

Which is the layer of a computer system between the hardware and the user program

A. Operating system

B. Operating environment

C. System environment

D. None

What is the correct answer?

4

In ____________ location policies a random node is polled to check its state and the task is transferred if it will not be overloaded; polling is continued until a suitable node is found.

A. Threshold

B. Shortest

C. Bidding

D. Pairing

What is the correct answer?

4

The _____________ are based on modification of the original message in some manner, or on creation of a false message.

A. Passive attack

B. Release of message content attack

C. Traffic analysis attack

D. Active attack

What is the correct answer?

4

Once text has been cut to the clipboard, you can____hat text into another document

A. Copy

B. Paste

C. Transfer

D. None of the above

What is the correct answer?

4

______________ refers to the technology in which some space in hard disk is used as an extension of main memory.

A. Cache memory

B. Paging

C. Virtual memory

D. Associative memory

What is the correct answer?

4

Which command is used to display the contents of the text file of DOS?

A. Copy

B. Copy con

C. Dir

D. Type

What is the correct answer?

4

A program to be executed must be in ---------------

A. main memory

B. secondary memory

C. virtual memory

D. Read only memory

What is the correct answer?

4

Find out the characteristics of System-oriented names:

A. They are large integers or bit strings.

B. They are of the same size

C. Generally shorter than human-oriented names and are easy for manipulations like hashing, sorting and so on.

D. All A, B, C

What is the correct answer?

4

Windows 2000 supports -------------- type of file system

A. NTFS

B. EFS

C. FEFS

D. EFFS

What is the correct answer?

4

______________ is a situation in which two computer programs sharing the same resource are effectively preventing each other from accessing the resource, resulting in both programs ceasing to function.

A. Semaphore

B. Deadlock

C. Mutual Exclusion

D. No preemption

What is the correct answer?

4

Which one is true for unconditional disk formatting?

A. Transfer system files after format

B. Do not check/scan surface after format

C. Destroys every byte of data on a disk by overwriting it with with blank spaces

D. All of above

What is the correct answer?

4

____________approach can place the data directly into the memory or take the data directly from the memory without direct intervention from the processor.

A. DMA

B. Daisy chain arbitration

C. polling

D. none of these