In UNIX, processes that have finished execution but have not yet had their status collected are known as ................ (A) Sleeping processes (B) Stopped Processes (C) Zombie Processes (D) Orphan Processes

1 Answer

Answer :

(C) Zombie Processes 

Related questions

Description : What is the function of following UNIX command? WC - lb& (A) It runs the word count program to count the number of lines in its input, a, writing the result to b, as a foreground process. (B) It runs ... (D) It copies the l ' numbers of lines of program from file, a, and stores in file b.

Last Answer : (B) It runs the word count program to count the number of lines in its input, a, writing the result to b, but does it in the background.

Description : In Unix, the command to enable execution permission for file “mylife” by all is ................ (A) Chmod ugo+X myfile (B) Chmod a+X myfile (C) Chmod +X myfile (D) All of the above

Last Answer : (D) All of the above

Description : The Unix Kernel maintains two key data structures related to processes, the process table and the user structure. Which of following information is not the part of user structure? (A) File descriptor table (B) System call state (C) Scheduling parameters (D) Kernel stack

Last Answer : (C) Scheduling parameters

Description : Let the time taken to switch between user mode and kernel mode of execution be T1 while time taken to switch between two user processes be T2. Which of the following is correct? (A) T1 < T2 (B) T1 > T2 (C) T1 = T2 (D) Nothing can be said about the relation between T1 and T2.

Last Answer : (A) T1 < T2

Description : WOW32 is a: (A) Win 32 API library for creating processes and threads. (B) Special kind of file system to the NT name space. (C) Kernel - mode objects accessible through Win32 API (D) Special execution environment used to run 16 bit Windows applications on 32 - bit machines.

Last Answer : (D) Special execution environment used to run 16 bit Windows applications on 32 - bit machines.

Description : Let Pi and Pj be two processes, R be the set of variables read from memory, and W be the set of variables written to memory. For the concurrent execution of two processes Pi and Pj, which of the following conditions is not true? (A) R(Pi)∩W(Pj)=Φ (B) W(Pi)∩R(Pj)=Φ (C) R(Pi)∩R(Pj)=Φ (D) W(Pi)∩W(Pj)=Φ

Last Answer : (C) R(Pi)∩R(Pj)=Φ 

Description : Suppose there are four processes in execution with 12 instances of a Resource R in a system. The maximum need of each process and current allocation are given below: With reference to current allocation, is system safe? If so, ... B) Yes, P1 P2 P3 P4 (C) Yes, P4 P3 P1 P2 (D) Yes, P2 P1 P3 P4

Last Answer : (C) Yes, P4 P3 P1 P2

Description : State true or false. i) Unix, support multiple user process but only support one thread per process. ii) A java run time environment is an example of a system of one process with multiple threads. A) True, False B) True, True C) False, True D) False, False

Last Answer : B) True, True

Description : The agency that sits between the user and the UNIX system is called the A. logic B. profile C. shell D. erxc E. None of the above

Last Answer : C. shell

Description : ……………….. is a example of an operating system that support single user process and single thread. A) UNIX B) MS-DOS C) OS/2 D) Windows 2000

Last Answer : B) MS-DOS

Description : A UNIX file system has 1 KB block size and 4-byte disk addresses. What is the maximum file size if the inode contains ten direct block entries, one single indirect block entry, one double indirect block entry and one triple indirect block entry? (A) 30 GB (B) 64 GB (C) 16 GB (D) 1 GB

Last Answer : (C) 16 GB

Description : Which statement is not true about process 0 in the Unix operating system? (A) Process 0 is called init process. (B) Process 0 is not created by fork system call. (C) After forking process 1, process 0 becomes swapper process. (D) Process 0 is a special process created when system boots.

Last Answer : (A) Process 0 is called init process.

Description : The directory structure used in Unix file system is called (A) Hierarchical directory (B) Tree structured directory (C) Directed acyclic graph (D) Graph structured directory

Last Answer : (C) Directed acyclic graph

Description : In Unix, how do you check that two given strings a and b are equal ? (A) test $a -eq $b (B) test $a -equal $b (C) test $a=$b (D) Sh -C test $a==$b

Last Answer : (C) test $a=$b Answer: C Explanation: Tests for a zero-length string: test -z string Tests for a nonzero string length: test -n string Tests two strings for equality: ... Tests two strings for inequality: test string1 != string2 Tests for a nonzero string length: test string

Description : ................. maintains the list of free disk blocks in the Unix file system. (A) I-node (B) Boot block (C) Super block (D) File allocation table

Last Answer : (C) Super block 

Description : The Unix command: $ vi file1 file2 (A) Edits file1 and stores the contents of file1 in file2 (B) Both files i.e. file1 and file2 can be edited using ex' command to travel between files (C) Both ... using the mv' command to move between the files (D) Edits file1 first, saves it and the edits file2

Last Answer : (B) Both files i.e. file1 and file2 can be edited using ‘ex’ command to travel between files

Description : A unix file may be of type: (A) Regular file (B) Directory File (C) Device File (D) Any one of the above 

Last Answer : (D) Any one of the above

Description : What will be the output of the following Unix command ? $rm chap0\[1 - 3\] (A) Remove file chap0[1 - 3] (B) Remove file chap01, chap02, chap03 (C) Remove file chap\[1 - 3\] (D) None of the above

Last Answer : (A) Remove file chap0[1 - 3]

Description : In Unix operating system, special files are used to : (A) buffer data received in its input from where a process reads (B) provide a mechanism to map physical device to file names (C ... pointers associated with i-nodes (D) store information entered by a user application program or utility program

Last Answer : (B) provide a mechanism to map physical device to file names 

Description : A unix file system has 1-KB blocks and 4-byte disk addresses. What is the maximum file size if i-nodes contain 10 direct entries and one single, double and triple indirect entry each? (A) 32 GB (B) 64 GB (C) 16 GB (D) 1 GB

Last Answer : (C) 16 GB

Description : In Unix, the login prompt can be changed by changing the contents of the file ............... (A) contrab (B) init (C) gettydefs (D) inittab

Last Answer : Answer: C

Description : Which of the following statement is not correct with reference to cron daemon in UNIX O.S? (A) The cron daemon is the standard tool for running commands on a predetermined schedule. (B) It starts ... command lines and the times at which they invoked. (D) Crontab for individual users are not stored.

Last Answer : (D) Crontab for individual users are not stored.

Description : Which of the following option with reference to UNIX operating system is not correct? (A) INT signal is sent by the terminal driver when one types and it is a request to terminate the current operation. ( ... that it defaults to producing a core dump if not caught. (D) KILL is a blockable signal.

Last Answer : (D) KILL is a blockable signal.

Description : Which of the following information about the UNIX file system is not correct? (A) Super block contains the number of i-nodes, the number of disk blocks, and the start of the list of free disk blocks. (B ... Each i-node is 256-bytes long. (D) All the files and directories are stored in data blocks. 

Last Answer : (C) Each i-node is 256-bytes long.

Description : In UNIX operating system, when a process creates a new process using the fork() system call, which of the following state is shared between the parent process and child process? (A) Heap (B) Stack (C) Shared memory segments (D) Both Heap and Stack

Last Answer : (C) Shared memory segments 

Description : In UNIX, ............ creates three subdirectories: 'PIS' and two subdirectories 'progs' and ‘data’ from just created subdirectory 'PIS'. (A) mdkir PIS/progs PIS/data PIS (B) mkdir PIS progs data (C) mkdir PIS PIS/progs PIS/data (D) mkdir PIS/progs data

Last Answer : (C) mkdir PIS PIS/progs PIS/data

Description : Unix command to change the case of first three lines of file “shortlist” from lower to upper (1) $ tr ‘[a-z]’ ‘[A-Z]’ shortlist | head-3 (2) $ head-3 shortlist | tr ‘[a-z]’ ‘[A-Z]’ (3) $ tr head-3 shortlist ‘[A-Z]’ ‘[a-z]’ (4) $ tr shortlist head-3 ‘[a-z]’ ‘[A-Z]’

Last Answer : (2) $ head-3 shortlist | tr ‘[a-z]’ ‘[A-Z]’ 

Description : Which statement is not correct about “init” process in Unix? (1) It is generally the parent of the login shell. (2) It has PID 1. (3) It is the first process in the system. (4) Init forks and execs a ‘getty’ process at every port connected to a terminal.

Last Answer : It is the first process in the system.

Description : What do programs do when they are Stopped in Unix / Linux?

Last Answer : It waits in memory, internal coding has no effect as the ^Z is a system command and pauses the program where it is. There is no memory management as the program and all variables stay in memory.

Description : A ……………… is a program that secretly takes over another Internet-attached computer and then uses that computer to launch attacks. A) Worm B) Zombie C) Virus D) Trap doors

Last Answer : B) Zombie

Description : …………….. are used in denial of service attacks, typically against targeted web sites. A) Worm B) Zombie C) Virus D) Trojan horse

Last Answer : B) Zombie

Description : A ………….. is a program that can infect other programs by modifying them, the modification includes a copy of the virus program, which can go on to infect other programs. A) Worm B) Virus C) Zombie D) Trap doors

Last Answer : B) Virus

Description : …………… programs can be used to accomplish functions indirectly that an unauthorized user could not accomplish directly. A) Zombie B) Worm C) Trojan Horses D) Logic Bomb

Last Answer : C) Trojan Horses

Description : Which of the following malicious program do not replicate automatically? A) Trojan Horse B) Virus C) Worm D) Zombie

Last Answer : A) Trojan Horse

Description : Match the following mechanisms for interrupting the execution of a process and their uses. i) Interrupt a) Call to an operating system function ii) Trap b) Reaction to an asynchronous external event iii) Supervisor Call c) Handling of a error ... -a, iii-b C) i-b, ii-c, iii-a D) i-a, ii-c, iii-b

Last Answer : C) i-b, ii-c, iii-a

Description : What is the correct term for having stopped or finished puberty?

Last Answer : Fully developed?

Description : For execution of DELETE SQL query in JDBC, ............. method must be used. A) executeQuery() B) executeDeleteQuery() C) executeUpdate() D) executeDelete()

Last Answer : C) executeUpdate()

Description : State weather the following statement is true or false for EJB. 1. EJB exists in the middle-tier 2. EJB specifies an execution environment 3. EJB supports transaction processing A) 1-true, 2. true, 3. true B) 1- ... false, 3. true C) 1- false, 2- false, 3- false D) 1-true, 2-true, 3-false

Last Answer : A) 1-true, 2. true, 3. true

Description : What will be the values of x, m and n after execution of the following statements? Int x, m, n; m=10; n=15; x= ++m + n++; A) x=25, m=10, n=15 B) x=27, m=10, n=15 C) x=26, m=11, n=16 D) x=27, m=11, n=16

Last Answer : C) x=26, m=11, n=16

Description : Assume that variable x resides at memory location 1234, y at 1111 and p at 2222. Int x=1, y=2, *p; p=&x; y=*p; What will be the value of y after execution of above code? A) 2 B) 1 C) 1234 D) 1111

Last Answer : C) 1234

Description : In …………….., the virus places an identical copy of itself into other programs or into certain system areas on the disk. A) Dormant phase B) Propagation phase C) Triggering phase D) Execution phase

Last Answer : B) Propagation phase

Description : Select the correct order for the different phases of virus execution. i) Propagation phase ii) Dormant phase iii) Execution phase iv) Triggering phase A) i, ii, iii, and iv B) i, iii, ii and iv s D) ii, iii, iv and i

Last Answer : C) ii, i, iv an iii

Description : State which statement is true for Suspended process? i) The process is not immediately available for execution. ii) The process may be removed from suspended state automatically without removal order. A) i only B) ii only C) i and ii only D) None

Last Answer : A) i only

Description : Process is ........................ A) A program in execution B) An instance of a program running on a computer. C) The entity that can be assigned to and executed D) All of the above.

Last Answer : D) All of the above.

Description : .................. refers to the ability of an operating system to support multiple threads of execution with a single process. A) Multithreading B) Multiprocessing C) Multiexecuting D) Bi-threading

Last Answer : A) Multithreading

Description : Code blocks allow many algorithms to be implemented with the following parameters : (A) clarity, elegance, performance (B) clarity, elegance, efficiency (C) elegance, performance, execution (D) execution, clarity, performance

Last Answer : (B) clarity, elegance, efficiency

Description : Debugger is a program that (A) allows to examine and modify the contents of registers (B) does not allow execution of a segment of program (C) allows to set breakpoints, execute a segment of program and display contents of register (D) All of the above

Last Answer : (C) allows to set breakpoints, execute a segment of program and display contents of register

Description : Verification: (A) refers to the set of activities that ensure that software correctly implements a specific function. (B) gives answer to the question - Are we building the product right ? (C) requires execution of software (D) both (A) and (B)

Last Answer : (D) both (A) and (B)