⟩ To increase the response time and throughput, the kernel minimizes the frequency of disk access by keeping a pool of internal data buffer called a) Pooling b) Spooling c) Buffer cache d) Swapping
c) Buffer cache
c) Buffer cache
Which command can be executed by a user who is already logged into the system, in order to change to the root user? (type the command without any parameters) a) su b) root c) chroot d) user
Which command is used to bring the background process to forground? a) bg b) fg c) background d) forground
The encrypted password of a user is stored in a) /etc/shadow b) /etc/enpasswwd c) /etc/.passwd d) /etc/passwd
What does the following command do? who | wc -l a) List the number of users logged in b) List the users c) List the number of users in the system d) Display the content of who command
Which of the following files need to be referred for user's secondary group? a) /etc/passwd b) /etc/shadow c) /etc/group d) /etc/profile
Return value of fork() system call can be a) -1,<0,0 b) -1,>0,0
Which niceness value among the following indicate most favorable scheduling? a) 0 b) 19 c) 5 d) -20
Fork returns _____ to parent process on success a) 0 b) child process id c) parent process id d) none
On x86-32 Linux, at which address the code segment of the program starts? a) 0×00000000 b) 0×08048000 c) 0×80000000 d) 0xbfff0000
A system has 512MB of physical memory. Which among the following is not a suitable virtual memory size for this system architecture? a) 512MB b) 256M c) 4GB d) None of the above