The kernel configuration file is normally changed only when you wish to:
A. Produce a smaller, more efficient kernel by removing unneeded items.
B. Add a new device
C. Modify a system parameter
D. all of the above.

1 Answer

Answer :

D. all of the above.

Related questions

Description : At the time Linux 2.0 kernel configuration the option…………………... adds TCP/IP networking to the kernel. A. CONFIG_IP_ACCT B. CONFIG_INET C. CONFIG_INET_PCTCP D. CONFIG_IP_FORWARD

Last Answer : B. CONFIG_INET

Description : . In a kernel configuration feature, . if ……………...is selected, the dynamically loadable module is loaded the first time a call is made to the kernel that requires the module. A. "m" B. "Y" C. "n" D. "r"

Last Answer : A. "m"

Description : The …………… command customizes the kernel configuration and generates the files needed to compile and link the kernel. A. ping B. ifconfig C. make config D. finger

Last Answer : C. make config

Description : ........... is a large kernel, including scheduling file system, networking, device drivers, memory management and more. A) Monolithic kernel B) Micro kernel C) Macro kernel D) Mini kernel

Last Answer : A) Monolithic kernel

Description : In SQL, the command(s) is (are)used tocreate an index for atable or cluster A. CREATE INDEX B. MODIFY INDEX C. SET INDEX TO FILE D. All of theabove E. None of the above

Last Answer : CREATE INDEX

Description : ........... is a large kernel containing virtually the complete operating system, including, scheduling, file system, device drivers and memory management. A) Multilithic kernel B) Monolithic kernel C) Micro kernel D) Macro kernel

Last Answer : B) Monolithic kernel

Description : Find out the components of DHCP: 1) A protocol that delivers host-specific configuration parameters from a server to a host. 2) The client determines its own hardware address; this is normally in a ROM on the hardware. 3) ... or permanent network addresses to hosts. A. 1,2 B. 1,3 C. 2,3 D. 1,2,3

Last Answer : B. 1,3

Description : Down sampling is to make a digital image file smaller by A. removing pixels B. adding noise C. adding pixels D. removing noise

Last Answer : A. removing pixels

Description : How can you increase the capacity of an Oracle tablespace? Note: there are 2 correct answers in this question A. Resize the existing data file B. Add a new data file to ... compression of backup data using Oracle advanced compression D. Increase the value of the database parameter DB_BLOCK_SIZE

Last Answer : B. Add a new data file to the existing tablespace

Description : The computer abbreviation KB usually means– (A) Key Block (B) Kernel Boot (C) Key Byte (D) Kit Bit (E) Kilo Byte

Last Answer : Kilo Byte

Description : . One of the more daunting challenges of managing a test project is that so many dependencies converge at test execution. One missing configuration file or hard ware device can render all your test results ... incident? A. Test managers faults only B. Test lead faults only C. Test manager and proj

Last Answer : A. Test managers faults only

Description : A command that lets youchange one or more fields in a record is A. Insert B. Modify C. Look-up D. All of theabove E. None of the above

Last Answer : Modify

Description : In SQL, which command(s) is(are) used to change atable's storage characteristics? A. ALTER TABLE B. MODIFY TABLE C. CHANGE TABLE D. All of theabove E. None of the abov

Last Answer : ALTER TABLE

Description : WOW32 is a: (A) Win 32 API library for creating processes and threads. (B) Special kind of file system to the NT name space. (C) Kernel - mode objects accessible through Win32 API (D) Special execution environment used to run 16 bit Windows applications on 32 - bit machines.

Last Answer : (D) Special execution environment used to run 16 bit Windows applications on 32 - bit machines.

Description : The Unix Kernel maintains two key data structures related to processes, the process table and the user structure. Which of following information is not the part of user structure? (A) File descriptor table (B) System call state (C) Scheduling parameters (D) Kernel stack

Last Answer : (C) Scheduling parameters

Description : Which of the following file organization is most efficient for a file with a high degree of file activity? a. Sequential b. ISAM c. VSAM d. B-Tree Index

Last Answer : Sequential

Description : What are some examples of the unnecessary complexity of language (and is it actually unneeded complexity)?

Last Answer : answer:My opinion is that the complexity is not unneeded. (How'd you like that? A double negative-unneeded complexity perhaps?). I think that what people might put forward as unneeded complexity actually ... in other cases it action isn't a negation at all. Confusing, and probably deliberately so.

Description : Which was money better spent, trillions on an unneeded war, or billions for electric cars?

Last Answer : Hm well, the thing is, from what I understand is a compilation of businessmen in the oil industry all came together and came out with a number of how much crude oil is obtainable from the Earth still ... , money was better spent on neither, because they balance themselves out. But I'm not for war.

Description : Examples of unneeded intrusions of privacy that the United States impose on it's citizens?

Last Answer : answer:Stuff that comes to mind. * All forms that require or collect needless data such as address, phone number, SSN, birth date. * TSA body scanners, and trivia databases (see the recent ... to determine who might be good targets to proactively eliminate because they might be likely to be hostile.

Description : How often do workers sign out items, or modify a product for themselves before putting the item on shelf?

Last Answer : Apartment managers sometimes get free cable.

Description : An output device that uses words or messages recorded on a magnetic medium to produce audio response is b. Magnetic tape c. Voice response unit d. Voice recognition unit e. Voice band

Last Answer : Voice response unit

Description : A communication device that combines transmissions from several I/O devices into one line is a A) Concentrator B) Modifier C) Multiplexer D) Full duplex file

Last Answer : C) Multiplexer

Description : A device is sending out data at the rate of 2000 bps. How long does it take to send a file of 1,00,000 characters ? a. 50 b. 200 c. 400 d. 800

Last Answer : c. 400

Description : Which of the following is/ are the drawbacks of Ring Topology? A) Failure of one computer, can affect the whole network B) Adding or removing the computers disturbs the network activity. C) If the central hub fails, the whole network fails to operate. D) Both of A and B

Last Answer : D) Both of A and B

Description : A parameter is: a. a sample characteristic b. a population characteristic c. unknown d. normal normally distributed 

Last Answer : b. a population characteristic

Description : Does anyone know how to modify this .swf file?

Last Answer : Considering how many places I’ve seen this with different graphics I’d guess that there’s some source code (or likely just an FLA file) floating around out there. I’ve not done much SWF “decompiling” but I’m not sure if you can do much beyond extract assets (graphics, sounds, etc).

Description : I need to modify my child support. The mother is now married and has additional income from her military husband. I am also married now and have another child to support. I make less than the original support order. Can I complete the form myself and file?

Last Answer : You can file for modification on the basis of a lower income. You cannot file for reduced child support because she is now married, though you could use that as a basis to terminate alimony.

Description : In flight, it is possible to: i. File an IFR flight plan ii. Modify an active flight plan iii. Cancel a VFR flight plan iv. Close a VFR flight plan (rules of the air ann2 3.3.5) a. i and ii b. i, ii, iii and iv c. ii, iii and iv d. i and iv

Last Answer : b. i, ii, iii and iv

Description : In flight, it is possible to: i. File an IFR flight plan ii. Modify an active flight plan iii. Cancel a VFR flight plan iv. Close a VFR flight plan (rules of the air ann2 3.3.5) a. i and ii b. i, ii, iii and iv c. ii, iii and iv d. i and iv

Last Answer : b. i, ii, iii and iv

Description : What is the process of copying software programs from secondary storage mediato the hard disk called? (A) Configuration (B) Download (C) Storage (D) Upload (E) Installation

Last Answer : Upload

Description : What cangreatly reduce TCP/IP configuration problems? A. WINS Server B. WINS Proxy C. DHCP Server D. PDC E. None of the above

Last Answer : DHCP Server

Description : State whether the following is True or False. i) In bus topology, heavy Network traffic slows down the bus speed. ii) It is multipoint configuration. A) True, True B) B) True, False C) False, True D) False, False

Last Answer : A) True, True

Description : Which of the following is a transport layer protocol? a. stream control transmission protocol b. internet control message protocol c. neighbor discovery protocol d. dynamic host configuration protocol

Last Answer : a. stream control transmission protocol

Description : Which operational mode/s of HDLC support/s the balanced configuration by governing point to point link connectivity in addition to the primary as well as secondary functions performed by the station? a. NRM b. ABM c. Both a & b d. None of the above

Last Answer : b. ABM

Description : The …………………... command can set or display the configuration values for a network interface. A. ping B. traceroute C. ifconfig D. finger

Last Answer : C. ifconfig

Description : DHCP stands for……………………………….. A. Dynamic Host Control Protocol B. Diskless Hosts Control protocol C. Diskless Hosts Configuration protocol D. Dynamic Host configuration Protocol

Last Answer : D. Dynamic Host configuration Protocol

Description : ……………………………. extends …………………………. to provide the full set of configuration parameters defined in the Requirements for Internet Hosts RFC. A. DHCP, BOOTP B. BOOTP, DHCP C. RARP, BOOTP D. DHCP, RARP

Last Answer : A. DHCP, BOOTP

Description : Which of the following is a transport layer protocol? A. stream control transmission protocol B. internet control message protocol C. neighbor discovery protocol D. dynamic host configuration protocol

Last Answer : A. stream control transmission protocol

Description : Define line configuration and give its types

Last Answer : It refers the way two or more communication devices attach to a link. A network consists of 2 or more computers directly connected by a physical medium. Types: i. Point to point – physical links are limited to a pair of nodes. ii. Multipoint – more than two nodes share a single physical link.

Description : Which of the following is not a dimension-less parameter? (A) Pressure-co-efficient (B) Froude number (C) Kinematic viscosity (D) Weber number

Last Answer : (C) Kinematic viscosity

Description : Which parameter is not changed by transformer ________. A. Amplitude B. Power C. Frequency D. None of these

Last Answer : Which parameter is not changed by transformer Frequency.

Description : Which parameter is not changed by transistor? A. Frequency B. phase C. amplitude D. all of these

Last Answer : Frequency parameter is not changed by transistor.

Description : Steam is to be condensed in a shell and tube heat exchanger, 5 m long with a shell diameter of 1 m. Cooling water is to be used for removing the heat. Heat transfer co-efficient ... ) Horizontal heat exchanger with steam on tube side (D) Horizontal heat exchanger with steam on shell side

Last Answer : (B) Vertical heat exchanger with steam on shell side

Description : What is the lifespan for items stored in ViewState? Select Answer:  1. Item stored in ViewState exist for the life of the current page  2. Item stored in ViewState exist for the life ... of the current Applicaiton  4. Item stored in ViewState exist for the life of the current configuration

Last Answer : 1. Item stored in ViewState exist for the life of the current page AS any web application works on request and response basis ,so on every post backs, The data in control gets lost. To retain page ... control with data. The life cycle of the view state exist for life of current running page only. 

Description : The Provision and Management of a controlled library containing all the configurations items is called as a) Configuration Control b) Status Accounting c) Configuration Identification d) Configuration Identification

Last Answer : The provision and management of a controlled library containing all the configuration items is called Configuration Management. Configuration Management is the process of identifying, organizing, and ... Verification and Audit (ensuring that the configuration items are complete and accurate).

Description : An IPv4 datagram is fragmented into three smaller datagrams. Which of the following is true? A) Thedo not fragment bit is set to 1 for all three datagrams. B) The more fragment bit ... Theidentification fieldis the same for all three datagrams. D) Theoffset field is thesame for all three datagrams

Last Answer : Theidentification fieldis the same for all three datagrams.

Description : An IPv4 datagram is fragmented into three smaller datagrams. Which of the following is true? A. The do not fragment bit is set to 1 for all three datagrams. B. The more fragment bit is set to 0 ... field is the same for all three datagrams. D. The offset field is the same for all three datagrams

Last Answer : C. The identification field is the same for all three datagrams.

Description : There arecertain packages that allow people to define data items, place these items in particular records, combine therecords into designated files and then manipulate and retrieve the storeddata. What arethey ... (DBMS) C. Batch processingsystem D. Data communication package E. None of the above

Last Answer : Database management system (DBMS)