Question
a.
file system
b.
user
c.
superuser
d.
none of the mentioned
Posted under Operating System
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. In UNIX, domain switch is accomplished via
Similar Questions
Discover Related MCQs
Q. When an attempt is to make a machine or network resource unavailable to its intended users, the attack is called
View solution
Q. The code segment that misuses its environment is called a
View solution
Q. The internal code of any software that will set of a malicious function when specified conditions are met, is called
View solution
Q. The pattern that can be used to identify a virus is known as
View solution
Q. Which one of the following is a process that uses the spawn mechanism to revage the system performance?
View solution
Q. What is a trap door in a program?
View solution
Q. Which one of the following is not an attack, but a search for vulnerabilities to attack?
View solution
Q. File virus attaches itself to the
View solution
Q. Multipartite viruses attack on
View solution
Q. In asymmetric encryption
View solution
Q. What is true regarding ‘Fence’ ?
View solution
Q. What is not true regarding ‘Fence’ ?
View solution
Q. What is correct regarding ‘relocation’ w.r.t protecting memory ?
View solution
Q. How can fence and relocation be used together ?
View solution
Q. What is basic need in protecting memory in multi-user environment ?
View solution
Q. What is role of base/bound registers ?
View solution
Q. What is all-or-nothing situation for sharing in memory ?
View solution
Q. How is disadvantage of all-or-nothing approach overcome ?
View solution
Q. What is true regarding tagged architecture ?
View solution
Q. What is best solution to have effect of unbounded number if base/bound registers?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Operating System? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!
Software Engineering
Learn about the systematic approach to developing software with our Software...
Cyber Security
Understand the fundamentals of safeguarding digital assets with our Cyber Security...