Which of the following option with reference to UNIX operating system is not correct? (A) INT signal is sent by the terminal driver when one types and it is a request to terminate the current operation. (B) TERM is a request to terminate execution completely. The receiving process will clean up its state and exit. (C) QUIT is similar to TERM, except that it defaults to producing a core dump if not caught. (D) KILL is a blockable signal.

1 Answer

Answer :

(D) KILL is a blockable signal.

Related questions

Description : Which of the following statement is not correct with reference to cron daemon in UNIX O.S? (A) The cron daemon is the standard tool for running commands on a predetermined schedule. (B) It starts ... command lines and the times at which they invoked. (D) Crontab for individual users are not stored.

Last Answer : (D) Crontab for individual users are not stored.

Description : ……………….. is a example of an operating system that support single user process and single thread. A) UNIX B) MS-DOS C) OS/2 D) Windows 2000

Last Answer : B) MS-DOS

Description : Which statement is not true about process 0 in the Unix operating system? (A) Process 0 is called init process. (B) Process 0 is not created by fork system call. (C) After forking process 1, process 0 becomes swapper process. (D) Process 0 is a special process created when system boots.

Last Answer : (A) Process 0 is called init process.

Description : In Unix operating system, special files are used to : (A) buffer data received in its input from where a process reads (B) provide a mechanism to map physical device to file names (C ... pointers associated with i-nodes (D) store information entered by a user application program or utility program

Last Answer : (B) provide a mechanism to map physical device to file names 

Description : In UNIX operating system, when a process creates a new process using the fork() system call, which of the following state is shared between the parent process and child process? (A) Heap (B) Stack (C) Shared memory segments (D) Both Heap and Stack

Last Answer : (C) Shared memory segments 

Description : Which of the following information about the UNIX file system is not correct? (A) Super block contains the number of i-nodes, the number of disk blocks, and the start of the list of free disk blocks. (B ... Each i-node is 256-bytes long. (D) All the files and directories are stored in data blocks. 

Last Answer : (C) Each i-node is 256-bytes long.

Description : Which statement is not correct about “init” process in Unix? (1) It is generally the parent of the login shell. (2) It has PID 1. (3) It is the first process in the system. (4) Init forks and execs a ‘getty’ process at every port connected to a terminal.

Last Answer : It is the first process in the system.

Description : The agency that sits between the user and the UNIX system is called the A. logic B. profile C. shell D. erxc E. None of the above

Last Answer : C. shell

Description : State true or false. i) Unix, support multiple user process but only support one thread per process. ii) A java run time environment is an example of a system of one process with multiple threads. A) True, False B) True, True C) False, True D) False, False

Last Answer : B) True, True

Description : A UNIX file system has 1 KB block size and 4-byte disk addresses. What is the maximum file size if the inode contains ten direct block entries, one single indirect block entry, one double indirect block entry and one triple indirect block entry? (A) 30 GB (B) 64 GB (C) 16 GB (D) 1 GB

Last Answer : (C) 16 GB

Description : The directory structure used in Unix file system is called (A) Hierarchical directory (B) Tree structured directory (C) Directed acyclic graph (D) Graph structured directory

Last Answer : (C) Directed acyclic graph

Description : ................. maintains the list of free disk blocks in the Unix file system. (A) I-node (B) Boot block (C) Super block (D) File allocation table

Last Answer : (C) Super block 

Description : The Unix Kernel maintains two key data structures related to processes, the process table and the user structure. Which of following information is not the part of user structure? (A) File descriptor table (B) System call state (C) Scheduling parameters (D) Kernel stack

Last Answer : (C) Scheduling parameters

Description : A unix file system has 1-KB blocks and 4-byte disk addresses. What is the maximum file size if i-nodes contain 10 direct entries and one single, double and triple indirect entry each? (A) 32 GB (B) 64 GB (C) 16 GB (D) 1 GB

Last Answer : (C) 16 GB

Description : In Unix, how do you check that two given strings a and b are equal ? (A) test $a -eq $b (B) test $a -equal $b (C) test $a=$b (D) Sh -C test $a==$b

Last Answer : (C) test $a=$b Answer: C Explanation: Tests for a zero-length string: test -z string Tests for a nonzero string length: test -n string Tests two strings for equality: ... Tests two strings for inequality: test string1 != string2 Tests for a nonzero string length: test string

Description : The Unix command: $ vi file1 file2 (A) Edits file1 and stores the contents of file1 in file2 (B) Both files i.e. file1 and file2 can be edited using ex' command to travel between files (C) Both ... using the mv' command to move between the files (D) Edits file1 first, saves it and the edits file2

Last Answer : (B) Both files i.e. file1 and file2 can be edited using ‘ex’ command to travel between files

Description : A unix file may be of type: (A) Regular file (B) Directory File (C) Device File (D) Any one of the above 

Last Answer : (D) Any one of the above

Description : What will be the output of the following Unix command ? $rm chap0\[1 - 3\] (A) Remove file chap0[1 - 3] (B) Remove file chap01, chap02, chap03 (C) Remove file chap\[1 - 3\] (D) None of the above

Last Answer : (A) Remove file chap0[1 - 3]

Description : In Unix, the command to enable execution permission for file “mylife” by all is ................ (A) Chmod ugo+X myfile (B) Chmod a+X myfile (C) Chmod +X myfile (D) All of the above

Last Answer : (D) All of the above

Description : In Unix, the login prompt can be changed by changing the contents of the file ............... (A) contrab (B) init (C) gettydefs (D) inittab

Last Answer : Answer: C

Description : What is the function of following UNIX command? WC - lb& (A) It runs the word count program to count the number of lines in its input, a, writing the result to b, as a foreground process. (B) It runs ... (D) It copies the l ' numbers of lines of program from file, a, and stores in file b.

Last Answer : (B) It runs the word count program to count the number of lines in its input, a, writing the result to b, but does it in the background.

Description : In UNIX, processes that have finished execution but have not yet had their status collected are known as ................ (A) Sleeping processes (B) Stopped Processes (C) Zombie Processes (D) Orphan Processes

Last Answer : (C) Zombie Processes 

Description : In UNIX, ............ creates three subdirectories: 'PIS' and two subdirectories 'progs' and ‘data’ from just created subdirectory 'PIS'. (A) mdkir PIS/progs PIS/data PIS (B) mkdir PIS progs data (C) mkdir PIS PIS/progs PIS/data (D) mkdir PIS/progs data

Last Answer : (C) mkdir PIS PIS/progs PIS/data

Description : Unix command to change the case of first three lines of file “shortlist” from lower to upper (1) $ tr ‘[a-z]’ ‘[A-Z]’ shortlist | head-3 (2) $ head-3 shortlist | tr ‘[a-z]’ ‘[A-Z]’ (3) $ tr head-3 shortlist ‘[A-Z]’ ‘[a-z]’ (4) $ tr shortlist head-3 ‘[a-z]’ ‘[A-Z]’

Last Answer : (2) $ head-3 shortlist | tr ‘[a-z]’ ‘[A-Z]’ 

Description : Which layer of OSI reference model is responsible for decomposition of messages and generation of sequence numbers to ensure correct re-composition from end to end of the network? (A) Physical (B) Data-link (C) Transport (D) Application

Last Answer : (C) Transport 

Description : Which of the following is/are correct with reference to Abstract class and interface ? (a) A class can inherit only one Abstract class but may inherit several interfaces. (b) An Abstract class can provide complete and default ... true (C) Both (a) and (b) are true (D) Neither (a) nor (b) is true

Last Answer : Answer: C

Description : Which of the following statement(s) is/are correct with reference to curve generation? I. Hermite curves are generated using the concepts of interpolation. II. Bezier curves are generated using the concepts of approximation. III. The ... (B) II and III only (C) I and II only (D) I, II and III only

Last Answer : (D) I, II and III only

Description : What are the features of the Unix operating system?

Last Answer : flexibe, faster to run programme ,very secure , portability

Description : Which of the following is/are example(s) of an Operating System? A. UNIX B. Linux C. Windows XP D. All of the above

Last Answer : D. All of the above

Description : C language was invented to write an operating system called UNIX. C is a successor of _______language which was introduced around 1970: a) A Language b) B Language c) Both of Above

Last Answer : b) B Language

Description : DOS, Windows XP, Windows Vista, Unix, Linux, MAC/OS X etc. are examples of: a) Operating System Software b) Package Software c) Utility Software d) None of These

Last Answer : a) Operating System Software

Description : Which of the following is not an example of Operating System? 1) Windows 98 2) BSD Unix 3) Microsoft Office XP 4) Red Hat Linux

Last Answer : 3) Microsoft Office XP

Description : Which company did SCO sue for using code UNIX in its Operating System ? 1) RedaHat 2) SuSE 3) IBM 4) Microsoft

Last Answer : 4) Microsoft

Description : Unix Operating System use _________ Multitasking 1) Preemptive 2) Cooperative 3) multiprogramming 4) None

Last Answer : 1) Preemptive

Description : Operating System for Microcomputer system is- 1) Unix 2) Linux 3) Windows 4) all

Last Answer : 1) Unix

Description : The operating system called UNIX is typically used for - 1) Desktop computers 2) Laptop computers 3) Supercomputers 4) All of these

Last Answer : 4) All of these

Description : Unix Operating System use _________ Multitasking 1 Preemptive 2 Cooperative 3 multiprogramming 4 None

Last Answer : 1 Preemptive

Description : Operating System for Microcomputer system is 1 Unix 2 Linux 3 Windows 4 all

Last Answer : 1 Unix

Description : The operating system called UNIX is typically used for - 1 Desktop computers 2 Laptop computers 3 Supercomputers 4 All of these

Last Answer : 4 All of these

Description : ___________is the most common operating system for running CRM software A. UNIX B. Windows NT C. Windows Vista D. Windows XP

Last Answer : A. UNIX

Description : The UNIX operating system is suitable for (1) Multi user (2) Real-Time Processing (3) Distributed Processing (4) Single user

Last Answer : Multi user

Description : The UNIX operating system is suitable for : (1) Multi user (2) Real-Time Processing (3) Distributed Processing (4) Single user

Last Answer : Multi user

Description : A thread is usually defined as a light weight process because an Operating System (OS) maintains smaller data structure for a thread than for a process. In relation to this, which of the following ... separate stack for each thread. (D) OS does not maintain virtual memory state for each thread.

Last Answer : (B) OS maintains only CPU registers for each thread.

Description : State weather the following statement is true or false for Sendmail. 1).Sendmail is a command-line tool designed for most UNIX-like operating systems. 2).It define a method of transferring mail, and acts as a client/server ... . false C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false

Last Answer : A. 1. True, 2. False, 3. true

Description : State True or False. 1. Term of reference is the final output of Feasibility Study 2. Design specification report is the final output of System Analysis A) 1-true, 2-true B) 1-false, 2-true C) 1-true, 2-false D) 1-false, 2-false

Last Answer : A) 1-true, 2-true

Description : Suppose there are four processes in execution with 12 instances of a Resource R in a system. The maximum need of each process and current allocation are given below: With reference to current allocation, is system safe? If so, ... B) Yes, P1 P2 P3 P4 (C) Yes, P4 P3 P1 P2 (D) Yes, P2 P1 P3 P4

Last Answer : (C) Yes, P4 P3 P1 P2

Description : What is the difference between Call by value and Call by reference?

Last Answer : A: Call By Value : When a function is called by value, then the value of the actual parameter is copied to the formal parameter (i.e. a separate copy is made). Any changes made with the ... with the values at that address of the formal parameter affects (changes) the value of the actual parameter.

Description : A ……………. takes a reference to an object of the same class as itself as an argument. A) Reference constructor B) Copy Constructor C) Self Constructor

Last Answer : B) Copy Constructor