Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

In the process table entry for the kernel process, the
process id value is

a) 0 b) 1 c) 2 d) 255 e) it does not have a process table entry

Answer Posted / astha

0

Is This Answer Correct ?    18 Yes 4 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

discuss the procedures to evaluate disk excess time

2648


What is the difference between kernel and operating system?

991


What is difference between post and put method?

1125


windows 3.1 is

1027


Is kernel a os?

989


Will disk cleanup delete my files?

961


Assuming one link of the Trojan horse copy-and-observe-later chain is broken. There are two other possible angles of attack by Alice: Alice logging on and attempting to read the string directly, and alice assigning a security level of sensitive to the back-pocket file. Does the reference monitor prevent these attacks?

2869


What happens when I reset my computer?

1090


Can we kill init process?

1104


Is google an operating system?

1001


What does root mean in computer terms?

1124


How do I clean up my computer to make it run faster?

1053


What is the name of first operating system?

979


Assuming feedback to the adversary flugging an error as each incorrect character is entered, what is the expected time to discover the correct password?

3376


How many os are there?

1015