Technical Questions

Q:

getppid() system call is used to bias the existing priority of a process 

A) TRUE B) FALSE
Answer & Explanation Answer: B) FALSE

Explanation:

It is used to get parent process identifier

Report Error

View Answer Workspace Report Error Discuss

Subject: Operating Systems
Exam Prep: GATE

1 4466
Q:

What is called scratch pad of computer?

Answer

Cache Memory is scratch pad of computer.

Report Error

View answer Workspace Report Error Discuss

Subject: Hardware

2 4449
Q:

An entity is a thing in the real world with an independent existence.

A) TRUE B) FALSE
Answer & Explanation Answer: A) TRUE

Explanation:

Entity is a real world object

Report Error

View Answer Workspace Report Error Discuss

Subject: Database
Job Role: Database Administration

1 4442
Q:

Describe how to perform Risk Analysis during software testing.

Answer

While a test plan is being created, risks involved in testing the product are to be taken into consideration along with possibility of their occurrence and the damage they may cause along with solutions; if any. Detailed study of this is called as Risk Analysis.


Some of the risks could be:


New Hardware 


New Technology 


New Automation Tool 


Sequence of code delivery 


Availability of application test resources 


Identify and describe the risk magnitude indicators: High, Medium and Low


High magnitude means the effect of the risk would be very high and non-tolerable. Company may face severe loss and its reputation is at risk. Must be tested.


Medium: tolerable but not desirable. Company may suffer financially but there is limited liability or loss of reputation. Should be tested.


Low: tolerable. Little or no external exposure. Little or no financial loss. Company’s reputation unaffected. Might be tested.


Three perspectives of Risk Assessment: Effect, Cause and Likelihood.


To assess risk by Effect, identify a condition, event or action and try to determine its impact.


To asses risk by Cause is opposite of by Effect. Begin by stating an undesirable event or condition and identify the set of events that could have permitted the condition to exist.


To asses risk by Likelihood is to determine the probability that a requirement will not be satisfied.

Report Error

View answer Workspace Report Error Discuss

Subject: Software Testing

0 4420
Q:

Why address bus in unidirectional and data bus is bidirectional?

Answer

Because there is no need address traansaction between processor and peripheral device but data bus is needed because data has to be read and write

Report Error

View answer Workspace Report Error Discuss

Subject: Hardware

3 4388
Q:

Where does the Real mode on the CPU come from?

Answer

The original 8086, which only had 1 MB of memory. This megabyte is split into low memory for IRQ tables, application memory and high memory.

Report Error

View answer Workspace Report Error Discuss

Subject: Hardware

3 4379
Q:

Can ROM be used as stack?

Answer

ROM cannot be used as stack because it is not possible to write to ROM.

Report Error

View answer Workspace Report Error Discuss

Subject: Hardware

6 4373
Q:

What is 1st / 2nd / 3rd / 4th generation processor?

Answer

The processor made of PMOS / NMOS / HMOS / HCMOS technology is called 1st / 2nd / 3rd / 4th generation processor, and it is made up of 4 / 8 / 16 / 32 bits.

Report Error

View answer Workspace Report Error Discuss

Subject: Hardware

3 4306