Home
Current Affairs January 2024

What is the correct answer?

4

You can use print manage window

A. To cancel the print job

B. To check status of files in the print queue

C. To interrupt printing

D. All of the above

Correct Answer :

D. All of the above


Related Questions

What is the correct answer?

4

Which of the following is drop down list?

A. Combo box

B. List

C. Text area

D. None

What is the correct answer?

4

Two clocks are said to be synchronized at a particular instance of time if the difference in time values of the two clocks is less than some specified constant. The difference in time values of two clocks is called ___________.

A. Interrupt

B. Clock Frequency

C. Clock Ticks

D. Clock Skew

What is the correct answer?

4

Find out the characteristics of System-oriented names:

A. They are large integers or bit strings.

B. They are of the same size

C. Generally shorter than human-oriented names and are easy for manipulations like hashing, sorting and so on.

D. All A, B, C

What is the correct answer?

4

Which command is used to display the contents of the text file of DOS?

A. Copy

B. Copy con

C. Dir

D. Type

What is the correct answer?

4

The name services of DCE include ________

A. the Cell Directory Service

B. the Global Directory Service

C. the Global Directory Agent

D. A,B and C

What is the correct answer?

4

IDL stands for_____________________

A. Integrated Data library

B. Isolated Data Library

C. Interface Data Language

D. Interface Definition Language

What is the correct answer?

4

Load balancing algorithms in ______________ class use the processor and process characteristics to allocate processes to nodes.

A. Static

B. Dynamic

C. Deterministic

D. Probabilistic

What is the correct answer?

4

PVM stands for

A. Parallel Virtual Machine

B. Parallel Virtual Message

C. Process Virtual Machine

D. Process Virtual Monitor

What is the correct answer?

4

The two sub systems of user mode layer of windows 2000 are _________ and __________

A. excel, executive

B. environment, integral

C. orbit , kernel

D. Kernel , executive

What is the correct answer?

4

______________ occurs when multiple processes or threads read and write data items so that the final result depends on the order of execution of instructions in the multiple processes.

A. Race condition

B. Mutual exclusion

C. Exception

D. Interrupt

What is the correct answer?

4

The _________takes any characters from standard input, and then echoes them to standard output.

A. kill character

B. cat command

C. cate command

D. control command

What is the correct answer?

4

The primary purpose of an operating system is a …

A. To allow people to use the computer

B. To make the most efficient use of computer hardware

C. To make computer easier to use

D. To keep system programmer employed

What is the correct answer?

4

A process may create a new process by executing ___________system call.

A. init

B. fork

C. create

D. new

What is the correct answer?

4

In case of modification an unauthorized party not only gains access to but tampers with an asset. This is an attack on ____________________.

A. availability

B. confidentiality

C. integrity

D. authenticity

What is the correct answer?

4

In case of ____________________transparency a file can transparently move to another server.

A. Location

B. Migration

C. Replication

D. Concurrency

What is the correct answer?

4

A solution to starvation is _____________.

A. segmentation

B. Aging

C. Paging

D. virtual memory

What is the correct answer?

4

The find command is different from most UNIX commands in that each of the argument expressions following the beginning path name is considered a _____________

A. action expression

B. Boolean expression.

C. Boolean constant

D. Search qualifiers

What is the correct answer?

4

_______refers to the block size of the DSM system, i.e. to the units of sharing and the unit of data transfer across the network when a network block fault occurs.

A. Granularity

B. Coherence

C. Abstraction

D. Synchronization

What is the correct answer?

4

A program to be executed must be in ---------------

A. main memory

B. secondary memory

C. virtual memory

D. Read only memory

What is the correct answer?

4

_______________occurs when two or more execution flows are able to run simultaneously.

A. Deadlock

B. Concurrency

C. race condition

D. interrupt

What is the correct answer?

4

____________approach can place the data directly into the memory or take the data directly from the memory without direct intervention from the processor.

A. DMA

B. Daisy chain arbitration

C. polling

D. none of these

What is the correct answer?

4

What is dispatch latency?

A. The time taken by the dispatcher to stop one process and start another

B. The whole time taken by all processor

C. The time taken by the processor to write a file into disk

D. None of Above

What is the correct answer?

4

A two-byte integer called ____________is interpreted as an index into an array of inodes in a fixed, known location on disk.

A. an inode

B. an inumber

C. an imap

D. an imark

What is the correct answer?

4

In Windows, start button is used to

A. Device setting

B. Run applications

C. All of above

D. Turn off the system

What is the correct answer?

4

The command used to create logical drive for specific location of disk

A. Format

B. Fdisk

C. Subst

D. All of the above

What is the correct answer?

4

The problem with logical dumping is ________________

A. very costly

B. very slow

C. human errors

D. all of these

What is the correct answer?

4

DSM stands for______________

A. Direct shared memory

B. Direct system memory

C. Distributed shared memory

D. Distributed system memory

What is the correct answer?

4

______________ selects a process from among the ready processes to execute on the CPU.

A. CPU Scheduler

B. Loader

C. Dispatcher

D. Compiler

What is the correct answer?

4

______________ is a situation in which two computer programs sharing the same resource are effectively preventing each other from accessing the resource, resulting in both programs ceasing to function.

A. Semaphore

B. Deadlock

C. Mutual Exclusion

D. No preemption

What is the correct answer?

4

In_________________ model, when a process does a release access, the contents of all the modifications are not immediately sent to other nodes but they are sent only on demand.

A. Release Consistency Model

B. Lazy Release consistency model

C. Weak Consistency Model

D. Processor Consistency Model