Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

In the process table entry for the kernel process, the
process id value is

a) 0 b) 1 c) 2 d) 255 e) it does not have a process table entry

Answer Posted / guest

answer is 'A'

Is This Answer Correct ?    56 Yes 7 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Is microsoft coming out with a new operating system?

949


Which processor is better amd or intel?

1103


What is an example of a network operating system?

986


What causes a corrupt operating system?

969


What are positional parameters?

1009


Why does kernel panic occur?

1010


Assuming one link of the Trojan horse copy-and-observe-later chain is broken. There are two other possible angles of attack by Alice: Alice logging on and attempting to read the string directly, and alice assigning a security level of sensitive to the back-pocket file. Does the reference monitor prevent these attacks?

2869


How do I merge folders on mac?

1044


How do you start up a computer?

1021


What is gnu os?

1018


What happens when I reset my computer?

1090


Difference Between Jfs & Jfs2?

1084


Is kernel a os?

989


Is heap shared between processes?

1012


Why is my computer so slow?

1063