Under UNIX, the death of a process generates a(n) __________ that produces a(n) __________.

a. event/signal
b. signal/event
c. interrupt/signal
d. signal/interrupt


a. event/signal

Computer Science & Information Technology

You might also like to view...

To move within the table you can use all of the following, except _____.

A. press the arrow keys B. type the name of the cell C. press the Tab key D. click the desired cell

Computer Science & Information Technology

You should place sparklines close to the charts containing the data they illustrate.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The conflict between the users' goal for unfettered access to data and the security administrator's goal to protect that data is an issue of ______________

a. System administration b. Access control c. Password protection d. Social engineering

Computer Science & Information Technology

You want to copy a set of files but be prompted before cp overwrites any existing files. You would use the ___ option to cp to accomplish this goal.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology