. In a kernel configuration feature, . if ……………...is selected, the dynamically loadable module
is loaded the first time a call is made to the kernel that requires the module.
A. "m"
B. "Y"
C. "n"
D. "r"

1 Answer

Answer :

A. "m"

Related questions

Description : At the time Linux 2.0 kernel configuration the option…………………... adds TCP/IP networking to the kernel. A. CONFIG_IP_ACCT B. CONFIG_INET C. CONFIG_INET_PCTCP D. CONFIG_IP_FORWARD

Last Answer : B. CONFIG_INET

Description : The …………… command customizes the kernel configuration and generates the files needed to compile and link the kernel. A. ping B. ifconfig C. make config D. finger

Last Answer : C. make config

Description : The kernel configuration file is normally changed only when you wish to: A. Produce a smaller, more efficient kernel by removing unneeded items. B. Add a new device C. Modify a system parameter D. all of the above.

Last Answer : D. all of the above.

Description : In Frame Relay, when. ______ is selected, it requires establishing andterminatingphases A) a PVC B) an SVC C) either (a) or (b) D) neither (a) nor (b)

Last Answer : an SVC

Description : Satellite-Switched Time-Division Multiple Access (SS/TDMA) is A. the method of determining whichdevice has access tothe transmission medium at any time. B. a medium access control technique for ... switching is used to dynamically changethechannel assignments D. All of theabove E. None of the above

Last Answer : a form of TDMA in which circuit switching is used to dynamically changethechannel assignments

Description : In ________ TDM, slots are dynamically allocated to improvebandwidth efficiency. A) synchronous B) statistical C) isochronous D) none of the above

Last Answer : statistical

Description : Dynamic routing protocol enable routers to a. Dynamically discover and maintain routes b. Distribute routing updates to other routers c. Reach agreement with other routers about the network topology d. All of the above

Last Answer : d. All of the above

Description : Routes are built automatically by………………….., manually by the system administrator, or dynamically by routing protocols. A. route B. traceroute C. ifconfig D. netstat

Last Answer : C. ifconfig

Description : The computer abbreviation KB usually means– (A) Key Block (B) Kernel Boot (C) Key Byte (D) Kit Bit (E) Kilo Byte

Last Answer : Kilo Byte

Description : What is the name of the display feature that highlights are of the screen which requires operator attention? a. Pixel b. Reverse video c. Touch screen d. Curso

Last Answer : Reverse video

Description : The distance between two stations M and N is L kilometers. All frames are K bits long. The propagation delay per kilometer is t seconds. Let R bits/second be the channel capacity. Assuming that processing ... maximum utilization, when the sliding window protocol used is: a. A b. B c. C d. D

Last Answer : c. C

Description : The term module in the design phase refers to ? Functions Procedures Sub programs All of the above

Last Answer : All of the above

Description : Which feature of Go Back N ARQ mechanism possesses an ability to assign the sliding window in the forward direction? a. Control Variables b. Sender Sliding Window c. Receiver Sliding Window d. Resending of frames

Last Answer : b. Sender Sliding Window

Description : Which feature of Go-Back-N ARQ mechanism possesses an ability to assign the sliding window in the forward diretion? A. Control Variables B. Sender Sliding Window C. Receiver Sliding Window D. Resending of frames

Last Answer : B. Sender Sliding Window

Description : Which of the following registers is loaded with the contents of the memory location pointed by the PC? a. Memory address registers b. Memory data registers c. Instruction register d. Program counter

Last Answer : Instruction register

Description : The subnet gets increasingly loaded with packets causing increase in delay in the delivery of packets, which can lead to more retransmission, and ultimately increasing more and more traffic. This is a concept called as _________ A. blockage B. Traffic jam. C. Congestion D. both a and b

Last Answer : C. Congestion

Description : The Unix Kernel maintains two key data structures related to processes, the process table and the user structure. Which of following information is not the part of user structure? (A) File descriptor table (B) System call state (C) Scheduling parameters (D) Kernel stack

Last Answer : (C) Scheduling parameters

Description : One of the disadvantages of user level threads compared to Kernel level threads is (1) If a user level thread of a process executes a system call, all threads in that process are ... privileges. (4) The library procedures invoked for thread management in user level threads are local procedures.

Last Answer : If a user level thread of a process executes a system call, all threads in that process are blocked.

Description : In IT terminology failure in the kernel is called as (1) Crash (2) C r a s h dump (3) Dump (4) Kernel error

Last Answer :  Crash

Description : A steel bar 5 m × 50 mm is loaded with 250,000 N. If the modulus of elasticity of the material is 0.2  MN/mm2  and Poisson's ratio is 0.25, the change in the volume of the bar is:  (A) 1.125 cm3 (B) 2.125 cm3 (C) 3.125 cm3 (D) 4.125 cm

Last Answer : (C) 3.125 cm

Description : (A) In `S_(N^(2))` reactions, complete inversion of configuration takes place. (R) In `S_(N^(1))` reactions, retention but not the inversion takes pla

Last Answer : (A) In `S_(N^(2))` reactions, complete inversion of configuration takes place. (R) In `S_(N^(1))` ... . D. IF (A) is incorrect but (R) is correct.

Description : Which of the following is form of semi conductor memory in which it is possible to change the contents of selected memory locations by applying suitable electrical signals? a. CAM b. ROM c. EPROM d. Abacus

Last Answer : EPROM

Description : In Frame Relay, when a _____ is selected, the correspondingtable entry is recorded for all switches by the administrator A) PVC B) SVC C) either (a) or (b) D) neither (a) nor (b)

Last Answer : PVC

Description : To change selected text toall capital letters, click the change case button, then click– (A) UPPERCASE (B) UPPER ALL (C) CAPS LOCK (D) Lock Upper (E) Large Size

Last Answer : UPPERCASE

Description : To avoid ambiguity, the names assigned to machines must be carefully selected from a ______ with complete control over the binding between the names and IP addresses A. Table B. look up table C. name space D. name table

Last Answer : C. name space

Description : What is the process of copying software programs from secondary storage mediato the hard disk called? (A) Configuration (B) Download (C) Storage (D) Upload (E) Installation

Last Answer : Upload

Description : What cangreatly reduce TCP/IP configuration problems? A. WINS Server B. WINS Proxy C. DHCP Server D. PDC E. None of the above

Last Answer : DHCP Server

Description : State whether the following is True or False. i) In bus topology, heavy Network traffic slows down the bus speed. ii) It is multipoint configuration. A) True, True B) B) True, False C) False, True D) False, False

Last Answer : A) True, True

Description : Which of the following is a transport layer protocol? a. stream control transmission protocol b. internet control message protocol c. neighbor discovery protocol d. dynamic host configuration protocol

Last Answer : a. stream control transmission protocol

Description : Which operational mode/s of HDLC support/s the balanced configuration by governing point to point link connectivity in addition to the primary as well as secondary functions performed by the station? a. NRM b. ABM c. Both a & b d. None of the above

Last Answer : b. ABM

Description : The …………………... command can set or display the configuration values for a network interface. A. ping B. traceroute C. ifconfig D. finger

Last Answer : C. ifconfig

Description : DHCP stands for……………………………….. A. Dynamic Host Control Protocol B. Diskless Hosts Control protocol C. Diskless Hosts Configuration protocol D. Dynamic Host configuration Protocol

Last Answer : D. Dynamic Host configuration Protocol

Description : Find out the components of DHCP: 1) A protocol that delivers host-specific configuration parameters from a server to a host. 2) The client determines its own hardware address; this is normally in a ROM on the hardware. 3) ... or permanent network addresses to hosts. A. 1,2 B. 1,3 C. 2,3 D. 1,2,3

Last Answer : B. 1,3

Description : ……………………………. extends …………………………. to provide the full set of configuration parameters defined in the Requirements for Internet Hosts RFC. A. DHCP, BOOTP B. BOOTP, DHCP C. RARP, BOOTP D. DHCP, RARP

Last Answer : A. DHCP, BOOTP

Description : Which of the following is a transport layer protocol? A. stream control transmission protocol B. internet control message protocol C. neighbor discovery protocol D. dynamic host configuration protocol

Last Answer : A. stream control transmission protocol

Description : Define line configuration and give its types

Last Answer : It refers the way two or more communication devices attach to a link. A network consists of 2 or more computers directly connected by a physical medium. Types: i. Point to point – physical links are limited to a pair of nodes. ii. Multipoint – more than two nodes share a single physical link.

Description : If Ac , Asc and A are areas of concrete, longitudinal steel and section of a R.C.C. column and m and c are the modular ratio and maximum stress in the configuration of concrete, the strength of column is (A) cAc + m cAsc (B) c (A - Asc) + m cAsc (C) c [A + (m - 1)ASC] (D) All the above

Last Answer : Answer: Option D

Description : We addr redundant bits toeach block to make thelength n = k + r. The resultingn-bit blocksare called _________. A) datawords B) blockwords C) codewords D) none of the above

Last Answer : codewords

Description : Which type of Sframe in HDLC exhibit the correspondence of last three bits [N(R)] by defining the negative acknowledgement (NAK) number with the code value of '01'? a. Receive ready b. Receive not ready c. Reject d. Selective Reject

Last Answer : c. Reject

Description : We add r redundant bits to each block to make the length n = k + r. The resulting n-bit blocks are called _________ A. datawords B. blockwords C. codewords D. none of the above

Last Answer : C. codewords

Description : The elements that have an outer electron configuration ns2 (read: n - s - 2) are called: w) halogens x) transition metals y) alkaline earths z) noble gases

Last Answer : ANSWER: Y -- ALKALINE EARTHS

Description : For the correct assignment of electronic configuration of a complex, the valence bond theory often requires the measurement of

Last Answer : For the correct assignment of electronic configuration of a complex, the valence bond theory often ... activity C. magnetic moment D. dipole moment

Description : What is meant by focused differentiation? A. Providing a high perceived value service or product to a selected market segment that justifies a substantial price premium B. ... differentiation D. Concentrating on differentiation as the primary means of achieving competitive advantage

Last Answer : Providing a high perceived value service or product to a selected market segment that justifies a substantial price premium

Description : What is meant by focused differentiation? A. Providing a high perceived value service or product to a selected market segment that justifies a substantial price premium B. ... differentiation D. Concentrating on differentiation as the primary means of achieving competitive advantage

Last Answer : Providing a high perceived value service or product to a selected market segment that justifies a substantial price premium

Description : A(n) ____________ is a measure of program size based on the number and  complexity of inputs, outputs, queries, files, and program interfaces.  a. function point  b. line of code  c. project plan  d. standard module  e. workplan

Last Answer : a. function point

Description : A critical feature of M&T is to understand____ a) energy management. b) what drives energy consumption c) product configuration d) none of the above

Last Answer : what drives energy consumption

Description : The most important feature of spiral model is (A) requirement analysis. (B) risk management. (C) quality management. (D) configuration management.

Last Answer : (B) risk management.

Description : Data integrity control A. is used to set upper and lower limits on numeric data B. requires the use of passwords toprohibit unauthorized access tothe file C. has the data dictionary keep thedate and time ... back-up,and most recent modificationfor all files D. All of theabove E. None of the above

Last Answer : has the data dictionary keep thedate and time of lastaccess last back-up,and most recent modificationfor all files

Description : The row rangefor a table is dynamically partitioned and each row range is called a) Tablet b) Row key c) Time stamp d) Pairs

Last Answer : Tablet

Description : The row rangefor a table is dynamically partitioned and each row range is called a) Tablet b) Row key c) Time stamp d) Pairs

Last Answer : Tablet