UNIX processes are created by a system primitive called __________.
a. fork
b. exec
c. init
d. run
a. fork
Computer Science & Information Technology
You might also like to view...
A security breach has been discovered. You have conducted a thorough forensic investigation of the breach. What is the last step in this investigation?
A. Preservation B. Analysis C. Presentation D. Decision
Computer Science & Information Technology
Generally, a very high speed Internet connection is referred to as ____
A Dial up B. bandwidth C. Broadband D. Physical
Computer Science & Information Technology