UNIX processes are created by a system primitive called __________.

a. fork
b. exec
c. init
d. run

a. fork

Computer Science & Information Technology

You might also like to view...

A security breach has been discovered. You have conducted a thorough forensic investigation of the breach. What is the last step in this investigation?

A. Preservation B. Analysis C. Presentation D. Decision

Computer Science & Information Technology

Generally, a very high speed Internet connection is referred to as ____

A Dial up B. bandwidth C. Broadband D. Physical

Computer Science & Information Technology