QuestionID : 11056
Subject
Name Operating Syatems Concepts
|
Q1. The cpu utilization is low when the system is
|
1. executing
|
2. thrasing
|
3. waiting
|
4. all
of the above
|
Correct
Answer : 2
|
3
|
QuestionID : 11057
Subject
Name Operating Syatems Concepts
|
Q2. Which of the following is non preemtive O.S.?
|
1. Unix
|
2. Windows
95
|
3. Windows
NT
|
4. None
|
Correct
Answer : 2
|
4
|
QuestionID : 11058
Subject
Name Operating Syatems Concepts
|
Q3. SJF is the best scheduling algorithm.
|
Correct
Answer : T
|
|
QuestionID : 11062
Subject
Name Operating Syatems Concepts
|
Q4. In a system that does not support swapping
a) the compiler normally binds symbolic addresses to relocatable addresses b) the compiler normally binds symbolic addresses to physical addresses c) the loader binds relocatable addresses to physical addresses d) binding of symbolic addresses to physical addresses normally takes place during execution |
1. a,b,c
|
2. c,d
|
3. a,c
|
4. all
of above
|
Correct
Answer : 3
|
|
QuestionID : 11064
Subject
Name Operating Syatems Concepts
|
Q5. FAT stands for
|
1. File
Allocation Table
|
2. File
Access Table
|
3. File
Attribute Table
|
4. None
of the above
|
Correct
Answer : 1
|
|
QuestionID : 11070
Subject
Name Operating Syatems Concepts
|
Q6. During the process of loading the program, a __________
modifies the actual
instruction so that the effect of load address is taken into account |
1. resource
locator
|
2. loader
|
3. relocating
loader
|
4. relocation
register
|
Correct
Answer : 4
|
|
QuestionID : 11071
Subject
Name Operating Syatems Concepts
|
Q7. ------ scheduler selects the process that is ready to execute
to CPU.
|
1. long-term
scheduler
|
2. short-term
scheduler
|
3. medium-term
scheduler
|
4. None
of these
|
Correct
Answer : 2
|
|
QuestionID : 11073
Subject
Name Operating Syatems Concepts
|
Q8. A thread is a light-weight process.
|
Correct
Answer : T
|
|
QuestionID : 11074
Subject
Name Operating Syatems Concepts
|
Q9. LAN covers radius of up to 10 KM
|
Correct
Answer : F
|
|
QuestionID : 11079
Subject Name Operating
Syatems Concepts
|
Q10. Mutex is Mutual Exclution semaphore.
|
Correct
Answer : T
|
|
QuestionID : 11081
Subject
Name Operating Syatems Concepts
|
Q11. The transfer of process from memory to secondary storage is
called
|
1. Process
loading
|
2. swapping
|
3. segmentation
|
4. relocating
|
Correct
Answer : 2
|
|
QuestionID : 11083
Subject
Name Operating Syatems Concepts
|
Q12. A process refers to 5 pages, A,B,C,D & E in the order -
A; B; C; D; A; B;
E; A; B; C; D; E. If the page replacement algorithm is FIFO,the number of pages which transfer with an emty internal store of 3 frames is |
1. 8
|
2. 10
|
3. 9
|
4. 7
|
Correct
Answer : 3
|
|
QuestionID : 11087
Subject
Name Operating Syatems Concepts
|
Q13. FCFS stands for -----
|
1. Fast
Come First Serve.
|
2. First
Come First Serve.
|
3. Both
are true.
|
4. Both
are False.
|
Correct
Answer : 2
|
|
QuestionID : 11090
Subject
Name Operating Syatems Concepts
|
Q14. Spatial locality refers to the problem that once a
location is referenced |
1. it
will not be referenced again.
|
2. it
will be referenced again.
|
3. A
nearby location will be referenced soon.
|
4. none
of the above.
|
Correct
Answer : 3
|
|
QuestionID : 11092
Subject
Name Operating Syatems Concepts
|
Q15. The CPU utilization is low when the system is
|
1. Timesharing
|
2. Thrashing
|
3. Multiprocessing
|
4. None
of the above
|
Correct
Answer : 2
|
|
QuestionID : 11094
Subject
Name Operating Syatems Concepts
|
Q16. SPOOLING stands for _________
|
1. Simultaneous
Peripheral Operations OnLine
|
2. Spontaneous
Peripheral Operations OnLine
|
3. Serial
Peripheral Operations OnLine |
4. None
of the above
|
Correct
Answer : 1
|
|
QuestionID : 11097
Subject Name Operating
Syatems Concepts
|
Q17. Which of the following is true?
a) the linkage editor is used to edit programs which have to be later linked together b) the linkage editor links object modules during compiling or assembling c) the linkage editor links object modules and resolves external references between them before loading d) the linkage editor resolves external references between the object modules during execution time |
1. only
c
|
2. a
and c
|
3. only
b
|
4. all
of the above
|
Correct
Answer : 1
|
|
QuestionID : 11098
Subject
Name Operating Syatems Concepts
|
Q18. A virtual memory is required for-
|
1. increasing
the speed
|
2. increasibg
the addressing modes
|
3. overcomming
the size limitation of main memeory
|
4. overcomming
the size limitation of cache memory
|
Correct
Answer : 3
|
|
QuestionID : 11099
Subject
Name Operating Syatems Concepts
|
Q19. With a single resource deadlock occures
|
1. if
there are more than two processes computing for that resource
|
2. if
there are only than two processes computing for that resource
|
3. if
there are a single process computing for that resource
|
4. None
of the above
|
Correct
Answer : 4
|
|
QuestionID : 11101
Subject
Name Operating Syatems Concepts
|
Q20. The following is not a form of IPC.
|
1. semaphore
|
2. pipe
|
3. shared
memory
|
4. buffering
|
Correct
Answer : 1
|
|
QuestionID : 11102
Subject
Name Operating Syatems Concepts
|
Q21. Disk request come to a disk driver for cylinders in the
order 10,22,20,2,40,6 and 38, at time when the disk drive is reading from
cylinder 20.
The seek time is 6 ms per cylinder. the total seek time, if the disk arm sheduling algorithm is closest cylinder next is |
1. 360
ms
|
2. 876
ms
|
3. 850
ms
|
4. 900
ms
|
Correct
Answer : 1
|
|
QuestionID : 11103
Subject
Name Operating Syatems Concepts
|
Q22. Fence register is used for
|
1. CPU
protection
|
2. Memory
protection
|
3. File
protection
|
4. All
of the above
|
Correct
Answer : 2
|
|
QuestionID : 11107
Subject
Name Operating Syatems Concepts
|
Q23. _____________ is a significant factor in maintaining
fragmentation
within usable limits |
1. External
Fragmentation
|
2. Paging
|
3. Coalescing
of holes
|
4. Both
2 and 3
|
Correct
Answer : 4
|
|
QuestionID : 11108
Subject
Name Operating Syatems Concepts
|
Q24. Pre-emptive scheduling is the strategy of temporarily
suspending a running
process |
1. before
the cpu time slice expires
|
2. to
allow starving process to run
|
3. when
it request i/o
|
4. none
of the above
|
Correct
Answer : 1
|
|
QuestionID : 11113
Subject
Name Operating Syatems Concepts
|
Q25. Overlay is
|
1. a
part of an Operating System
|
2. a
specific memory location
|
3. a
single contiguous memory that was used in the olden days for running large
programs by swapping
|
4. overloading
the system with many user files
|
Correct
Answer : 3
|
|
QuestionID : 11114
Subject
Name Operating Syatems Concepts
|
Q26. The problem of thrashing may be reduced by
|
1. Using
preparing mechanism
|
2. Writing
well structered programs
|
3. Both
1 and 2
|
4. Neither
1 nor 2
|
Correct
Answer : 3
|
|
QuestionID : 11115
Subject
Name Operating Syatems Concepts
|
Q27.
the address sequence generated by a particular program executing in demand paging with 100 records per page with one free memory frame is recorded.what is the number of page fault; 100,200,430,499,510,530,560,120,220,240,260,320,370 |
1. 13
|
2. 7
|
3. 8
|
4. 10
|
Correct
Answer : 4
|
|
QuestionID : 11119
Subject
Name Operating Syatems Concepts
|
Q28. Which of the following is true?
a) Overlays are used to increase the size of physical memory b) Overlays are used to increase the logical address space c) when overlays are used the size of project is not limited to the size of physical memory d) Overlays are used whenever the physical address space is smaller than the logical address space |
1. a
and b
|
2. only
c
|
3. only
a
|
4. none
of the above
|
Correct
Answer : 2
|
|
QuestionID : 11121
Subject
Name Operating Syatems Concepts
|
Q29. which of the following is an example of SPOOLED device
|
1. The
terminal used to enter the input data for a program being executed.
|
2. The
secondary memory device in a virtual memory system.
|
3. A
line printer used to print the output of a number of jobs.
|
4. none
of the above.
|
Correct
Answer : 3
|
|
QuestionID : 11124
Subject
Name Operating Syatems Concepts
|
Q30. Necessary condition for deadlock are
|
1. non
preemption and circular wait
|
2. mutual
exclusion and partial allocation
|
3. a
and b
|
4. None
of these
|
Correct
Answer : 3
|
|
QuestionID : 11126
Subject
Name Operating Syatems Concepts
|
Q31. Round-Robbin understands priority?
|
Correct
Answer : F
|
|
QuestionID : 11129
Subject
Name Operating Syatems Concepts
|
Q32. A certain moving arm disk storage with one head has
following specifications:
Number of tracks/recording surface=200 Disk rotation speed=2400 rpm. Track storage capacity=62500 bits The avarage latency time (assume that the head can move from one track to another only by traversing the entire track) is |
1. 2.5
s
|
2. 2.9
s
|
3. 3.1
s
|
4. 3.6
s
|
Correct
Answer : 1
|
|
QuestionID : 11130
Subject
Name Operating Syatems Concepts
|
Q33. Which of the following CPU scheduling algorithms will
prevent the starvation algorithm?
|
1. Shortest
job first.
|
2. Priority
schedulling.
|
3. Priority
schedulling with aging mechanism.
|
4. None
of the above.
|
Correct
Answer : 3
|
|
QuestionID : 11132
Subject
Name Operating Syatems Concepts
|
Q34. Critical region is
|
1. a
part of operating system which is not allowed to be accessed by any process.
|
2. a
set of instructions that access common shared resource which exclude one
another in time.
|
3. the
portion of main memory which can be accessed only by one process at a time.
|
4. None
of the above.
|
Correct
Answer : 2
|
|
QuestionID : 11134
Subject
Name Operating Syatems Concepts
|
Q35. The I/O subsystem consists of__________
|
1. Memory
management component including buffering,caching and spooling
|
2. A
general device driver interface
|
3. Drivers
for specific hardware devices
|
4. All
of the above
|
Correct
Answer : 4
|
|
QuestionID : 11136
Subject
Name Operating Syatems Concepts
|
Q36. Efficient operation of computer system and Convinience for
user
are the goals of operating system. |
Correct
Answer : T
|
|
QuestionID : 11142
Subject
Name Operating Syatems Concepts
|
Q37. The signal of the keyboard sends to the computer a special
kind of
message called |
1. keyboard
request
|
2. keyboard
controller
|
3. interrupt
controller
|
4. interrupt
request
|
Correct
Answer : 4
|
|
QuestionID : 11143
Subject
Name Operating Syatems Concepts
|
Q38. Concurrent processes are processes that
|
1. Do
not overlap in time
|
2. Overlap
in time
|
3. Are
executed by a processor at the same time
|
4. None
of above
|
Correct
Answer : 2
|
|
QuestionID : 11144
Subject
Name Operating Syatems Concepts
|
Q39. The time of admission of job to ready queue to completion
is_______
|
1. Turnaround
time
|
2. Burst
time
|
3. Response
time
|
4. None
of the above.
|
Correct
Answer : 1
|
|
QuestionID : 11145
Subject
Name Operating Syatems Concepts
|
Q40. A file system uses the contiguous space allocation mechanism
for disk allocation .For better utilization of disk space ,this file system
must use
|
1. A
garbage collection mechanism
|
2. A
disk compaction mechanism
|
3. A
linked-block allocation mechanism
|
4. An
indexed-block allocation mechanism
|
Correct
Answer : 4
|
|
QuestionID : 11146
Subject
Name Operating Syatems Concepts
|
Q41. Disk scheduling involves deciding
|
1. which
disk should be accessed next
|
2. the
order in which disk access request must be serviced
|
3. the
physical location where files should be accessed in the disk
|
4. none
of the above
|
Correct
Answer : 2
|
|
QuestionID : 11151
Subject
Name Operating Syatems Concepts
|
Q42. Which of the following CPU scheduling algorithm will prevent
starvation
problem. |
1. shortest-job-first
|
2. priority
scheduling
|
3. priority
scheduling with aging mechanism
|
4. None
of the above
|
Correct
Answer : 3
|
|
QuestionID : 11152
Subject
Name Operating Syatems Concepts
|
Q43. Kernel is
|
1. considered
as critical part of operating system.
|
2. software
which monitors operating system.
|
3. set
of primitive functions upon which rest of operating system functions are
built up.
|
4. none
of the above.
|
Correct
Answer : 3
|
|
QuestionID : 11155
Subject Name Operating
Syatems Concepts
|
Q44. The page replacement policy that some times leads to more
page faults when size of memory is increased is
|
1. FIFO
|
2. LRU
|
3. No
such policy exists
|
4. None
of above
|
Correct
Answer : 1
|
|
QuestionID : 11156
Subject
Name Operating Syatems Concepts
|
Q45. Dirty bit for a page in page table
|
1. helps
avoids unnecessary writes on paging
|
2. helps
maintain LRU information
|
3. allows
only read on a page
|
4. none
|
Correct
Answer : 1
|
|
QuestionID : 11157
Subject
Name Operating Syatems Concepts
|
Q46. At a perticular time of computation the value of counting
semaphore
is 7. Then 20 `p` operation abd x `v` operation were completed on this semaphore. If the final value of the semaphore is 5, x will be... |
1. 15
|
2. 22
|
3. 18
|
4. 13
|
Correct
Answer : 3
|
|
QuestionID : 11161
Subject
Name Operating Syatems Concepts
|
Q47. The main purpose(s)of an operating system is/are________
|
1. Convenience
for the user.
|
2. Efficient
operation of the Computer system.
|
3. Optimal
use of Computer resources.
|
4. All
of the above
|
Correct
Answer : 4
|
|
QuestionID : 11165
Subject
Name Operating Syatems Concepts
|
Q48. Bankers algorithm is an example of deadlock avoidance.
|
Correct
Answer : T
|
|
QuestionID : 11166
Subject
Name Operating Syatems Concepts
|
Q49. cipher text is decrypted text.
|
Correct
Answer : T
|
|
QuestionID : 11170
Subject
Name Operating Syatems Concepts
|
Q50. The process of loading the os into the main memory is done
by the bootstrap loader. |
Correct
Answer : T
|
|
QuestionID : 11172
Subject
Name Operating Syatems Concepts
|
Q51. Andrew and Sprite are examples of Distributed operating
system.
|
Correct
Answer : T
|
|
QuestionID : 11175
Subject
Name Operating Syatems Concepts
|
Q52. CPU performance is based on:-
|
1. ALU
width.
|
2. Clock
speed .
|
3. Number
of instructions executed per second.
|
4. both
a and b.
|
Correct
Answer : 3
|
|
QuestionID : 11176
Subject
Name Operating Syatems Concepts
|
Q53. The protected mode is necessary for
|
1. Multi-tasking
system
|
2. Multi-user
system
|
3. Both
1 and 2
|
4. 16
bit programming
|
Correct
Answer : 3
|
|
QuestionID : 11177
Subject
Name Operating Syatems Concepts
|
Q54. DMA stands for Dynamic memory allocation.
|
Correct
Answer : F
|
|
QuestionID : 11184
Subject
Name Operating Syatems Concepts
|
Q55. Intime sharing operating system ,
when time slot given to a process is completed , the process goes from RUNNING state to the |
1. BLOCKED
state
|
2. Ready
State
|
3. SUSPENDED
state
|
4. TERMINATED
state
|
Correct
Answer : 2
|
|
QuestionID : 11186
Subject
Name Operating Syatems Concepts
|
Q56. The size of virtual memory depends on the size of the
|
1. data
bus
|
2. main
memory
|
3. address
bus
|
4. none
|
Correct
Answer : 3
|
|
QuestionID : 11187
Subject
Name Operating Syatems Concepts
|
Q57. `Aging` is
|
1. keeping
track of cache contents
|
2. keeping
track of what pages are currently residing in the memory
|
3. keeping
track how many times the given page is refrenced
|
4. increasing
the priority of jobs to ensure termination in a finite time
|
Correct
Answer : 4
|
|
QuestionID : 11189
Subject
Name Operating Syatems Concepts
|
Q58. In paged memory system if the page size is increased then
internal fragmentation generally.
|
1. becomes
less
|
2. becomes
more
|
3. remains
constant
|
4. none
of the above
|
Correct
Answer : 2
|
|
QuestionID : 11196
Subject
Name Operating Syatems Concepts
|
Q59. In a multi-user OS,20 requests are made to a particular
resource per hour,on an average.The probability that no requests are made in
45 minutes is
|
1. (e)-15
|
2. (e)-5
|
3. 1-(e)-5
|
4. 1-(e)-10
|
Correct
Answer : 4
|
|
QuestionID : 11199
Subject
Name Operating Syatems Concepts
|
Q60. Which of the following is not a part of a process control
block(PCB).
|
1. Values
of a CPU registers
|
2. CPU
Scheduling information
|
3. Memory
limits of the process
|
4. List
of files accessible to the proces.
|
Correct
Answer : 4
|
|
QuestionID : 11200
Subject
Name Operating Syatems Concepts
|
Q61. RAID level 3 is also known as
|
1. memory-style
error-correcting code.
|
2. Block-interleaved
parity organization.
|
3. Bit-interleaved
parity organization.
|
4. All
of the above
|
Correct
Answer : 2
|
|
QuestionID : 11204
Subject
Name Operating Syatems Concepts
|
Q62. _________ sheduler select the process that is ready to
execute to CPU.
|
1. Long
term
|
2. Short
term
|
3. medium
term
|
4. none
of above
|
Correct
Answer : 2
|
|
QuestionID : 11208
Subject
Name Operating Syatems Concepts
|
Q63. In multi programming environment
|
1. A
processor executes more than one process at a time.
|
2. The
program are developed by more than one person.
|
3. More
than one process resides in memory
|
4. A
single user can executes many programs at the same time.
|
Correct
Answer : 3
|
|
QuestionID : 11209
Subject
Name Operating Syatems Concepts
|
Q64. FIFO and LRU are the popular page replacement algorithms.
|
Correct
Answer : T
|
|
QuestionID : 11211
Subject
Name Operating Syatems Concepts
|
Q65. In a page segemented scheme of memory management, the
segement table
itself must have a page table because... |
1. the
segement tabble is often too large to fit in one page
|
2. each
segment is seperated over a number of pages
|
3. segement
tables point to page tables and not to the physical location of the segement
|
4. the
processor`s description base register point to a page table
|
Correct
Answer : 2
|
|
QuestionID : 11216
Subject
Name Operating Syatems Concepts
|
Q66. Sector Interleaving in disks is doen by
|
1. disk
manufacturer
|
2. disk
controller cord
|
3. the
operating system
|
4. none
of above
|
Correct
Answer : 3
|
|
QuestionID : 11222
Subject
Name Operating Syatems Concepts
|
Q67. Which of the following scheduling policy is well
suited for a time-shared operating system? |
1. Shortest
job first
|
2. Round
robin
|
3. First-come-first-serve
|
4. Elevator
|
Correct
Answer : 2
|
|
QuestionID : 11224
Subject
Name Operating Syatems Concepts
|
Q68. Which of the following are RTOS ?
|
1. An
on-line railway reservation system
|
2. A
process control system.
|
3. Aircraft
control system.
|
4. Payroll
processing system.
|
Correct
Answer : 3
|
|
QuestionID : 11235
Subject
Name Operating Syatems Concepts
|
Q69. The Motivations Behind Networks are
1)Resource Sharing 2)Computation Speedup 3)Reliability 4)Communication |
1. 1,2
|
2. 1,3
|
3. only
3
|
4. All
the Above
|
Correct
Answer : 4
|
|
QuestionID : 11236
Subject Name Operating
Syatems Concepts
|
Q70. Which of the following is a non-preemtive O.S?
|
1. Unix
|
2. Windows95
|
3. Wnidows
NT
|
4. None
of the above
|
Correct
Answer : 4
|
|
QuestionID : 11237
Subject
Name Operating Syatems Concepts
|
Q71. The main purpose of an Operatimg system is/are ...
|
1. convenience
for the user
|
2. efficient
operation of the computer system.
|
3. optimal
use of the compuetr resources.
|
4. All
of the above.
|
Correct
Answer : 4
|
|
QuestionID : 11242
Subject
Name Operating Syatems Concepts
|
Q72. In a typical unix set up the host machinbe is attached to
the termnals through
|
1. i/o
card
|
2. Disk
controller card
|
3. Sound
blaster card
|
4. 4/8
- port contrller card
|
Correct
Answer : 4
|
|
QuestionID : 11244
Subject
Name Operating Syatems Concepts
|
Q73. Round Robin is an example of timesharing scheduling policy.
|
Correct
Answer : T
|
|
QuestionID : 11245
Subject
Name Operating Syatems Concepts
|
Q74. The segmented memory is provided mainly
|
1. for
higher speeds
|
2. to
maintain compatibity with old processors
|
3. for
ease of application programming
|
4. simple
hardware
|
Correct
Answer : 1
|
|
QuestionID : 11247
Subject
Name Operating Syatems Concepts
|
Q75. Unix is an example of multiuser system.
|
Correct
Answer : T
|
|
QuestionID : 11250
Subject
Name Operating Syatems Concepts
|
Q76. single system image is obtained in case of Distributed
system
|
Correct
Answer : T
|
|
QuestionID : 11252
Subject
Name Operating Syatems Concepts
|
Q77. Device Controller is a Hardware
|
Correct
Answer : F
|
|
QuestionID : 11255
Subject
Name Operating Syatems Concepts
|
Q78. Consider a system having m resources of same type.The
resources are shared by
3 processes A,B ,C which have peak time demands of 3,4,6 respctively.The minimum value of m that ensures that deadlock will never occur is |
1. 11
|
2. 12
|
3. 13
|
4. 14
|
Correct
Answer : 1
|
|
QuestionID : 11258
Subject
Name Operating Syatems Concepts
|
Q79. Consider a computer with 8 Mbytes of the main memory &
128 K cache.The cache block size is 4K .It
uses a direct mapping scheme for the cache management. how many different main memory blocks can map on to a given physical cache block |
1. 2048
|
2. 256
|
3. 64
|
4. none
|
Correct
Answer : 3
|
|
QuestionID : 11260
Subject
Name Operating Syatems Concepts
|
Q80. Which of the following statement is not true
|
1. A
directory is a special type of file.
|
2. A
directory is used to store file attribute.
|
3. A
directory is used to store file data.
|
4. A
directory is used to store file access information.
|
Correct
Answer : 3
|
|
QuestionID : 11262
Subject
Name Operating Syatems Concepts
|
Q81. Which schedular selects the process that is ready toexecute
to CPU.
|
1. long
term schedular
|
2. mid-term
schedular
|
3. short-term
schedular
|
4. any
schedular does not do that task
|
Correct
Answer : 3
|
|
QuestionID : 11270
Subject
Name Operating Syatems Concepts
|
Q82. Within `` piping and redirection metacharacters cannot be
used.
|
Correct
Answer : F
|
|
QuestionID : 11272
Subject
Name Operating Syatems Concepts
|
Q83. which of the following is false
|
1. deadlock
state is unsafe
|
2. unsafe
state may lead to deadlock situation
|
3. unsafe
state must lead to deadlock situation
|
4. deadlock
system is subset of unsafe system
|
Correct
Answer : 3
|
|
QuestionID : 11274
Subject
Name Operating Syatems Concepts
|
Q84. If filenames are supplied as arguments to a script
rm"$@" would remove all files supplied as arguments.
|
Correct
Answer : T
|
|
QuestionID : 11275
Subject
Name Operating Syatems Concepts
|
Q85. a demand paging system with page table held in registers
takes 5 milli sec to service a page fault, if an empty page is available,
or if page to be replaced is not dirty. It takes 50 milli sec if the replaced page is dirty. memory access time is 1 micro sec, assume we want an effective access time of 2 micro sec and that page to be replaced is dirty 60% of time, what is the approximate maximum acceptible page fault rate to meet this access time requirement |
1. 0.1%
|
2. 1.0%
|
3. 2.5%
|
4. 0.01%
|
Correct
Answer : 4
|
|
QuestionID : 11276
Subject
Name Operating Syatems Concepts
|
Q86. Which of the following statements is not true?
|
1. a
directory is special type of file
|
2. a
directory is used to store file attributes
|
3. a
directory is used to store data
|
4. a
directory is used to store file access information
|
Correct
Answer : 3
|
|
QuestionID : 11280
Subject
Name Operating Syatems Concepts
|
Q87. $? gives the PID of last background process, where as $!
gives the exit status of the last command executed.
|
Correct
Answer : F
|
|
QuestionID : 11286
Subject
Name Operating Syatems Concepts
|
Q88. When $,*,\,? or `` are enclosed within a pair of double
qoutes they continue to enjoy their same normal meaning.
|
Correct
Answer : F
|
|
QuestionID : 11287
Subject
Name Operating Syatems Concepts
|
Q89. Th e correct matching of the following pairs :
A. disk sccheduling 1.round robin B. batch processing 2.scan C. time sharing 3. LIFO D. interrupt processing 4.FIFO |
1. A-3,B-4,C-2,D-1
|
2. A-4,B-3,C-2,D-1
|
3. A-2,B-4,C-1,D-3
|
4. A-2,B-1,C-4,D-3
|
Correct
Answer : 3
|
|
QuestionID : 11290
Subject
Name Operating Syatems Concepts
|
Q90. Mutex is an acronym for Mutual Exclusion.
|
Correct
Answer : T
|
|
QuestionID : 11292
Subject
Name Operating Syatems Concepts
|
Q91. Suppose the following files are present in the current
directory:
ashish arctan dac.doc dim.dwg document fag fibonacci finder fog folder sam si.c tarun zenith zombie Which files would be listed by the following command? Is [!fd] |
1. None
|
2. zenith
zombie
|
3. [!fd]
not found
|
4. fag
fibonacci finder fog folder
|
Correct
Answer : 3
|
|
QuestionID : 11293
Subject
Name Operating Syatems Concepts
|
Q92. Suppose the following files are present in the current
directory:
ashish arctan dac.doc dim.dwg document fag fibonacci finder fog folder sam si.c tarun zenith zombie Which files would be listed by the following command? Is[!fd]* |
1. Displays
all the files other than those whose names begin with `f`or `d`
|
2. Displays
all the files other than those whose names begin with `f`or `d`or `.c`
|
3. Display
all files
|
4. None
|
Correct
Answer : 1
|
|
QuestionID : 11297
Subject
Name Operating Syatems Concepts
|
Q93. the fol.is a part of FAT
|
1. sector
info
|
2. disk
type
|
3. date
info
|
4. none
|
Correct
Answer : 1
|
|
QuestionID : 11303
Subject
Name Operating Syatems Concepts
|
Q94. b=
[-n $b] echo $ ? [-z $b] echo $? |
1. Will
run fine
|
2. test
: argument expected
|
3. error
|
4. none
|
Correct
Answer : 2
|
|
QuestionID : 11304
Subject
Name Operating Syatems Concepts
|
Q95. x=3 y=5 z=10
if [\($x-eq 3\) -a \($y - eq 5 - 0 $z - eq 10\) ] then echo $x else echo $y fi |
1. 2
|
2. 3
|
3. none
|
4. 4
|
Correct
Answer : 1
|
|
QuestionID : 11305
Subject
Name Operating Syatems Concepts
|
Q96. point out error
a=12 b=12.52 if[a=b] then echo "\n a and b are equal" fi |
1. [a=b]
|
2. fi
|
3. both
|
4. none
|
Correct
Answer : 1
|
|
QuestionID : 11308
Subject
Name Operating Syatems Concepts
|
Q97. A space allocated in units of fixed size is called block
|
Correct
Answer : T
|
|
QuestionID : 11309
Subject
Name Operating Syatems Concepts
|
Q98. Single system image is obtained in case of ----
|
1. desktop
|
2. Distributed
|
3. network
|
4. none
|
Correct
Answer : 2
|
|
QuestionID : 11311
Subject
Name Operating Syatems Concepts
|
Q99. 80826 the addressing schema is __________ addressing
|
1. 8
bit
|
2. 16
bit
|
3. 24
bit
|
4. 28
bit
|
Correct
Answer : 3
|
|
QuestionID : 11629
Subject
Name Operating Syatems Concepts
|
Q100. Banking Algorithm is example of
|
1. Deadlock
avoidance
|
2. deadlock
detection
|
3. both
option 1 and option 2
|
4. deadlock
recovery
|
Correct
Answer : 1
|
|
QuestionID : 11320
Subject Name Linux
|
Q1. The shell script containing functions should be executed in
the current
shell. |
Correct
Answer : T
|
|
QuestionID : 11325
Subject Name Linux
|
Q2. OPTIND and OPTARG are unix defined variables.
|
Correct
Answer : T
|
|
QuestionID : 11332
Subject Name Linux
|
Q3. Setting made using stty in a shell script are effective only
during
the execution of the script.The orignal setting are restored the moment excution of the script is over. |
Correct
Answer : F
|
|
QuestionID : 11344
Subject Name Linux
|
Q4. To list hidden as well as normal files in thr current
directory the command you would use is--
|
1. ls
- a
|
2. ls
- b
|
3. ls
- l
|
4. None
of above.
|
Correct
Answer : 1
|
|
QuestionID : 11369
Subject Name Linux
|
Q5. what
would be the output of the following program:
name=Sanjay surname=khare echo{name=rahul} echo{middlename+Rahul} echo${surname-Arora} |
1. Sanjay
Blank line Khare |
2. Khare
Blank line sanjay |
3. error
|
4. none
of the above
|
Correct
Answer : 1
|
|
QuestionID : 11376
Subject Name Linux
|
Q6. The minium number of links for any directory file are two.
|
Correct
Answer : T
|
|
QuestionID : 11380
Subject Name Linux
|
Q7. A common user can not set sticky for his file.
|
Correct
Answer : T
|
|
QuestionID : 11381
Subject Name Linux
|
Q8. Setting a sticky bit for a non executable file is
meaningless.
|
Correct
Answer : T
|
|
QuestionID : 11394
Subject Name Linux
|
Q9. How would you perform the following operation on the contents
of a given file.
Replace one or more spaces with a single space |
1. 1,$s/[][]*/[]/g
|
2. 1,$s/[]*/[]/g
|
3. 1,$s/[][]+/[]/g
|
4. 1,$s/[]+/[]/g
|
Correct
Answer : 1
|
|
QuestionID : 11399
Subject Name Linux
|
Q10. The command cat test1 test2 >> test3 would concatenate
the contents of test1
and test2 and overwrite the contents of test3 with the concatenated contents. |
Correct
Answer : F
|
|
QuestionID : 11400
Subject Name Linux
|
Q11. Until = 1
while [$until =1] do echo until can not be used as veriable name done |
1. No
Error,unitl
can be used as veriavle name. |
2. untill
is reseved word it can`t be used as veriable name.
|
3. none
|
4. none
|
Correct
Answer : 1
|
|
QuestionID : 11402
Subject Name Linux
|
Q12. How would you perform the following operations on the
contents of a given file.
Replace one or more spaces following a fullstop or a comma with two spaces |
1. 1,$s/[.,][][]*/[][]/g
|
2. 1,$s,[.][,][][]*/[][]/g
|
3. 1,$s/[.,][]*/[]/g
|
4. 1,$s/[.,][][]+/[]/g
|
Correct
Answer : 1
|
|
QuestionID : 11404
Subject Name Linux
|
Q13. Command to create 5 empty files
empty1,empty2,empty3,empty4,empty5
|
1. touch
empty1,empty2,empty3,empty4,empty5
|
2. cat
empty1,empty2,empty3,empty4,empty5
|
3. Both
|
4. None
of above
|
Correct
Answer : 1
|
|
QuestionID : 11405
Subject Name Linux
|
Q14. "g/^[[]tab]*$/d" :command use to delete all the
blank lines
|
Correct
Answer : T
|
|
QuestionID : 11409
Subject Name Linux
|
Q15. How would you perform the following operations on the
contents of a given file.
insert a> and a space at the start of every line in the file |
1. 1,$s/^/>[][]/g
|
2. 1,$s/>[][]/g
|
3. 1,$s/^/>[]/g
|
4. none
of the above
|
Correct
Answer : 1
|
|
QuestionID : 11413
Subject Name Linux
|
Q16. Which of the following is a popular terminal emulation
software
|
1. VTERM
|
2. VT100
|
3. COMIT
|
4. Perl
|
Correct
Answer : 1
|
|
QuestionID : 11420
Subject Name Linux
|
Q17. The program contained in boot block that loads kernel into
memory is called
|
1. Disk
Bootstrap program
|
2. Master
Boot program
|
3. shell
program
|
4. None
of above
|
Correct
Answer : 1
|
|
QuestionID : 11425
Subject Name Linux
|
Q18. Purpose of .exrc file is convinient way to customize the vi
environment and like all
good things you shold put it to utmost use to improve your efficiency . |
Correct
Answer : T
|
|
QuestionID : 11440
Subject Name Linux
|
Q19. Which command displays the line numbers by the side of each
line?
|
1. set
nu
|
2. set
ai
|
3. set
eb
|
4. set
ic
|
Correct
Answer : 1
|
|
QuestionID : 11446
Subject Name Linux
|
Q20. while executing a shell script shell acts as a compiler
|
Correct
Answer : F
|
|
QuestionID : 11450
Subject Name Linux
|
Q21. vi has only help can be invocked using F1key
|
Correct
Answer : F
|
|
QuestionID : 11452
Subject Name Linux
|
Q22. To change our existing password we can execute the file
/etc/passwd
|
Correct
Answer : F
|
|
QuestionID : 11459
Subject Name Linux
|
Q23. Unix can be ported to a new hardware platform with minimum
changes in the unix code
|
Correct
Answer : T
|
|
QuestionID : 11461
Subject Name Linux
|
Q24. Any Shell script by default get executed in the current
shell
|
Correct
Answer : F
|
|
QuestionID : 11469
Subject Name Linux
|
Q25. to search a pattern which starts with uni the command would
be
|
1. :/
< uni
|
2. :/\
< uni
|
3. :
/ \ < uni >
|
4. none
|
Correct
Answer : 2
|
|
QuestionID : 11473
Subject Name Linux
|
Q26. A DOS formatted floopy can be used in UNIX and formated
floppy can be used in DOS
|
Correct
Answer : F
|
|
QuestionID : 11478
Subject Name Linux
|
Q27. Once a jopb is submited for printing using lp command we
have to take print out even if on second thoughts we realise that we should
not have the printed the file
|
Correct
Answer : F
|
|
QuestionID : 11487
Subject Name Linux
|
Q28. What will be the output of the following command.
command: at now + 15 minutes clear is -l ctrl d output: NO OUTPUT. |
Correct
Answer : F
|
|
QuestionID : 11492
Subject Name Linux
|
Q29. The file /bin/sysadmsh can be executed only by the system
admin.
|
Correct
Answer : T
|
|
QuestionID : 11502
Subject Name Linux
|
Q30. A null variable a can be created using
|
1. a=
|
2. a=`
`
|
3. a=``
``
|
4. All
of above
|
Correct
Answer : 4
|
|
QuestionID : 11510
Subject Name Linux
|
Q31. what will be the output:
command: at now +1 week < atfile output: NO output. |
Correct
Answer : F
|
|
QuestionID : 11512
Subject Name Linux
|
Q32. Which statements are true if the file which contains the
following line is
submitted to the crontab command. 10 2 3 * 0 echo ``There is no substitute for hard work`` |
1. The
message is echoed on the 3rd of every month at 2.10 a.m
|
2. The
message is echoed on the 3rd of every month at 2.10 p.m
|
3. The
message is echoed on the 3rd of every month at 2.10 a.m
if it happens to be a sunday |
4. None
of the above.
|
Correct
Answer : 3
|
|
QuestionID : 11513
Subject Name Linux
|
Q33. The shell meta character $# represents
|
1. total
number of arguments supplied to the shell script
|
2. total
number of files in the current directory
|
3. total
number of users who have logged in
|
4. total
number of process running in the background
|
Correct
Answer : 1
|
|
QuestionID : 11519
Subject Name Linux
|
Q34. The command wc -l < aaa displays the no of words present
in the
file aaa. |
Correct
Answer : F
|
|
QuestionID : 11522
Subject Name Linux
|
Q35. The state of the file system is contained in
|
1. Boot
block
|
2. A
special block created by Boot Block
|
3. Super
Block
|
4. None
of the above
|
Correct
Answer : 3
|
|
QuestionID : 11527
Subject Name Linux
|
Q36. A floppy can be formated only by system administrator
|
Correct
Answer : F
|
|
QuestionID : 11539
Subject Name Linux
|
Q37. It is neccesary to unmount a file system before removing a
floppy.
|
Correct
Answer : T
|
|
QuestionID : 11546
Subject Name Linux
|
Q38. doscp /usr/aa1/cobol/* b:/ Command for copy all the files
from /usr/aa1/cobol directory to a dos formatted floppy in drive B
|
Correct
Answer : T
|
|
QuestionID : 11549
Subject Name Linux
|
Q39. Unix commands which accept the input from standard input
device and
send the output to the standard output device are called "filters". |
Correct
Answer : T
|
|
QuestionID : 11556
Subject Name Linux
|
Q40. Unix commands which accept the input from standard input
device
and send the output to the standard output device are known as filters. |
Correct
Answer : T
|
|
QuestionID : 11557
Subject Name Linux
|
Q41. Which of the following is not a filter ?
|
1. head
|
2. grep
|
3. tail
|
4. ls
|
Correct
Answer : 4
|
|
QuestionID : 11559
Subject Name Linux
|
Q42. k=35
echo `[$k -eq 35 ] ``[$k-eq 50]` |
1. blank
line
|
2. dotted
line
|
3. error
|
4. none
|
Correct
Answer : 1
|
|
QuestionID : 11565
Subject Name Linux
|
Q43. i=3
if[! -z $i] then echo ABC else echo abc fi |
1. ABC
|
2. abc
|
3. error
|
4. none
|
Correct
Answer : 1
|
|
QuestionID : 11566
Subject Name Linux
|
Q44. To perform the numeric test we must use -ge instead of >=
|
Correct
Answer : T
|
|
QuestionID : 11572
Subject Name Linux
|
Q45. cat < file1 > file2
cat > file2 < file1 Both the commands will show the same result. |
Correct
Answer : T
|
|
QuestionID : 11593
Subject Name Linux
|
Q46. if x=11 and y=6 then exit status of :
[ $x -eq 5 -o $y - ne 3 ] |
1. 0
|
2. 1
|
3. 11
|
4. none
|
Correct
Answer : 1
|
|
QuestionID : 11600
Subject Name Linux
|
Q47. A file can have links across file system.
|
Correct
Answer : F
|
|
QuestionID : 11612
Subject Name Linux
|
Q48. point out error
1. Echo Enter filename 2. read fname 3. if[-rwx $fname] 3. then 4. echo read write and execute permissions 5. fi |
1. line
3
|
2. line
1
|
3. line
5
|
4. no
error
|
Correct
Answer : 1
|
|
QuestionID : 11620
Subject Name Linux
|
Q49. The process id number of the process vhand,bdflush,sched and
init are
|
1. 1,2,3
1nd 4
|
2. 2,3,0
and 1
|
3. 3,4,1
and 2
|
4. 0,1,2
and 3
|
Correct
Answer : 2
|
|
QuestionID : 11621
Subject Name Linux
|
Q50. The daemon process can be killed using using the kill
command
|
Correct
Answer : F
|
|
QuestionID : 11317
Subject Name Linux
|
Q1. When you login the functions that you have declared
automatically get loaded in the memory.
|
Correct
Answer : F
|
|
QuestionID : 11320
Subject Name Linux
|
Q2. The shell script containing functions should be executed in
the current
shell. |
Correct
Answer : T
|
|
QuestionID : 11321
Subject Name Linux
|
Q3. Functions get executed faster than the corresponding shell
script.
|
Correct
Answer : T
|
|
QuestionID : 11324
Subject Name Linux
|
Q4. All shell script automatically get executed in the current
shell.
|
Correct
Answer : F
|
|
QuestionID : 11325
Subject Name Linux
|
Q5. OPTIND and OPTARG are unix defined variables.
|
Correct
Answer : T
|
|
QuestionID : 11326
Subject Name Linux
|
Q6. if a shell script is called from another then the called
shell script
should necessarly have a return statement. |
Correct
Answer : F
|
|
QuestionID : 11331
Subject Name Linux
|
Q7. All unix command always have single character option.
|
Correct
Answer : T
|
|
QuestionID : 11333
Subject Name Linux
|
Q8. we can trap a signal such that on occurence of that signal a
particular
shell script gets executed. |
Correct
Answer : T
|
|
QuestionID : 11340
Subject Name Linux
|
Q9. Hidden files in Unix always begin with a character " .
"
|
Correct
Answer : T
|
|
QuestionID : 11345
Subject Name Linux
|
Q10. What are the modes of operation of vi
|
1. Command
Mode
|
2. Insert
Mode
|
3. ex
command mode
|
4. all
of the above
|
Correct
Answer : 4
|
|
QuestionID : 11348
Subject Name Linux
|
Q11. Usually size of each block in Unix file system is----
|
1. 512
|
2. 1024
|
3. 2048
|
4. None
of above.
|
Correct
Answer : 2
|
|
QuestionID : 11349
Subject Name Linux
|
Q12. Which are the editors available under unix
|
1. vi
|
2. ed
|
3. ex
|
4. all
of the above
|
Correct
Answer : 4
|
|
QuestionID : 11366
Subject Name Linux
|
Q13. All device related files are present in /dev directory.
|
Correct
Answer : T
|
|
QuestionID : 11375
Subject Name Linux
|
Q14. Shell program is usually stored in a file called Unix.
|
Correct
Answer : F
|
|
QuestionID : 11388
Subject Name Linux
|
Q15. The file that controls the printer is stored in a
sub-directory called printer created by system admin.
|
Correct
Answer : F
|
|
QuestionID : 11390
Subject Name Linux
|
Q16. point out the errors if any
j=1 while [ $j -le 10 ] do echo $j j=j+1 done |
1. j=1
|
2. while
[ $j -le 10 ]
|
3.
echo $j
|
4.
j=j+1
|
Correct
Answer : 4
|
|
QuestionID : 11399
Subject Name Linux
|
Q17. The command cat test1 test2 >> test3 would concatenate
the contents of test1
and test2 and overwrite the contents of test3 with the concatenated contents. |
Correct
Answer : F
|
|
QuestionID : 11405
Subject Name Linux
|
Q18. "g/^[[]tab]*$/d" :command use to delete all the
blank lines
|
Correct
Answer : T
|
|
QuestionID : 11406
Subject Name Linux
|
Q19. If every user working on unix set up is to use the
printer,then the printer should be attached to
|
1. the
host machine
|
2. any
of the terminal
|
3. the
terminal from wher the first login was made
|
4. none
|
Correct
Answer : 1
|
|
QuestionID : 11412
Subject Name Linux
|
Q20. break statement is used to exit from
|
1. if
statement
|
2. for
loop
|
3. a
program
|
4. none
|
Correct
Answer : 2
|
|
QuestionID : 11414
Subject Name Linux
|
Q21. Each entry in inode table is of size
|
1. 64kb
|
2. 32kb
|
3. 32bytes
|
4. 64bytes
|
Correct
Answer : 4
|
|
QuestionID : 11417
Subject Name Linux
|
Q22. which of the following is the command for the searching a pattern
in a file
|
1. find
|
2. grep
|
3. lookup
|
4. none
|
Correct
Answer : 2
|
|
QuestionID : 11421
Subject Name Linux
|
Q23. To logout from your terminal you
|
1. Switch
off the terminal
|
2. Press
ctrl -d or type exit
|
3. press
ctrl-Alt-Del
|
4. do
nothing it is the system administrator who would do this for you
|
Correct
Answer : 2
|
|
QuestionID : 11424
Subject Name Linux
|
Q24. What is the output of following program segments?
n="ask me" echo $n echo "$n" echo `$n` |
1. ask
me
ask me $n |
2. ask
me
$n ask me |
3. ask
me
|
4. $n
|
Correct
Answer : 1
|
|
QuestionID : 11431
Subject Name Linux
|
Q25. Which commands in vi would you use to perform Block copy
|
1. :m
co p
|
2. :m,n
co p
|
3. both
of above
|
4. none
of these
|
Correct
Answer : 3
|
|
QuestionID : 11450
Subject Name Linux
|
Q26. vi has only help can be invocked using F1key
|
Correct
Answer : F
|
|
QuestionID : 11454
Subject Name Linux
|
Q27. variable declare in the shell script can be displayed at the
$(doller) promot
using the set command |
Correct
Answer : F
|
|
QuestionID : 11458
Subject Name Linux
|
Q28. expr can handle only integers where as bc can handle both
integer as well as
floats |
Correct
Answer : T
|
|
QuestionID : 11462
Subject Name Linux
|
Q29. Unix kernel acts as an agent between the shell and the
hadware
|
Correct
Answer : T
|
|
QuestionID : 11465
Subject Name Linux
|
Q30. In a typical unix Enviornment there are several kernels and
one
shell |
Correct
Answer : F
|
|
QuestionID : 11468
Subject Name Linux
|
Q31. banner "aaa\nbbb" will display "aaa" and
"bbb" as large characters
split over to lines |
Correct
Answer : T
|
|
QuestionID : 11471
Subject Name Linux
|
Q32. A shell variable can not handled negative value
|
Correct
Answer : F
|
|
QuestionID : 11477
Subject Name Linux
|
Q33. You can yank line from one file and paste them into another
file
|
Correct
Answer : F
|
|
QuestionID : 11481
Subject Name Linux
|
Q34. Once a job is submited for printing using the lp command we
have to remain logged in till our file gets printed
|
Correct
Answer : F
|
|
QuestionID : 11488
Subject Name Linux
|
Q35. We can not see contents of packed or compressed file unless
we unpack or uncompress it
|
Correct
Answer : F
|
|
QuestionID : 11490
Subject Name Linux
|
Q36. The main purpose(s) of an O.S. is
|
1. convinience
for the user
|
2. optimal
use of computing resourse
|
3. both
|
4. none
|
Correct
Answer : 3
|
|
QuestionID : 11496
Subject Name Linux
|
Q37. When fork() is given
|
1. It
creats a child process
|
2. Allocate
slot in process table
|
3. returns
0 to parent & ID to child
|
4. All
of the above
|
Correct
Answer : 4
|
|
QuestionID : 11501
Subject Name Linux
|
Q38. The command /etc/init 1 puts the system in multi user mode
|
Correct
Answer : F
|
|
QuestionID : 11511
Subject Name Linux
|
Q39. The command cat < file1 > file2 will copy the contents
of file1
to file2 |
Correct
Answer : T
|
|
QuestionID : 11526
Subject Name Linux
|
Q40. A single Unix file System can be split over multiple hard
Disks
|
Correct
Answer : F
|
|
QuestionID : 11528
Subject Name Linux
|
Q41. On executing a statement set -3+1
|
1. $1
would be -3
|
2. $1
would be -
|
3. $1
would be set
|
4. this
command would result into an error
|
Correct
Answer : 4
|
|
QuestionID : 11538
Subject Name Linux
|
Q42. which is following is NOT shell keyword
|
1. shift
|
2. readonly
|
3. unset
|
4. ls
|
Correct
Answer : 4
|
|
QuestionID : 11541
Subject Name Linux
|
Q43. A tar command always needs at least one function option.
|
Correct
Answer : T
|
|
QuestionID : 11545
Subject Name Linux
|
Q44. The number of inodes that can be created on a floppy disk
have been fixed according to their capacities.
|
Correct
Answer : F
|
|
QuestionID : 11564
Subject Name Linux
|
Q45. Which command can be used to find all links with vi editor
suupose the
|
1. $ls
-i /bin/vi
|
2. $find
/ -inum < inode no > -print
|
3. Both
1 and 2
|
4. None
of the above
|
Correct
Answer : 3
|
|
QuestionID : 11572
Subject Name Linux
|
Q46. cat < file1 > file2
cat > file2 < file1 Both the commands will show the same result. |
Correct
Answer : T
|
|
QuestionID : 11602
Subject Name Linux
|
Q47. how will you find out which jobs have been submitted for
execution in future?
|
1. using
at -l command
|
2. using
at -t command
|
3. using
fut -jobs command
|
4. none
|
Correct
Answer : 1
|
|
QuestionID : 11605
Subject Name Linux
|
Q48. Which of the following is not true?
|
1. sorting
is done on the basis of first charecter of each line
|
2. sort
command sorts a file word by word rather than line by line
|
3. sort
command has a provision to do a numeric sort
|
4. sort
is not a filter
|
Correct
Answer : 2
|
|
QuestionID : 11612
Subject Name Linux
|
Q49. point out error
1. Echo Enter filename 2. read fname 3. if[-rwx $fname] 3. then 4. echo read write and execute permissions 5. fi |
1. line
3
|
2. line
1
|
3. line
5
|
4. no
error
|
Correct
Answer : 1
|
|
QuestionID : 11613
Subject Name Linux
|
Q50. In scheduling using "batch" command the system
decides the best
time for executing our command.Moreover the time at which our command will be executed is not in our control. |
Correct
Answer : T
|
|