CS604 Midterm Online Quiz

0%

CS604-Midterm

1 / 50

Cache is non-volatile memory.

2 / 50

In Unix/ Linux, by default the standard input file is attached to the ___________

3 / 50

Preemptive ----------------scheduling is sometimes called shortestremaining-time-first scheduling.

4 / 50

____ command display the status of a process.

5 / 50

A_____ is an abstract key for accessing a file.

6 / 50

Round Robin algorithm is similar to ____________ scheduling but preemption is added to switch between processes.

7 / 50

The bottom-up view is that operating system is a resource manager who manages the hardware and software resources in the computer system.

8 / 50

_________buffer places no practical limit on the size of the buffer

9 / 50

Bounded Buffer is a buffer of ____________ size

10 / 50

An operating system is a control program that manages the execution of user programs to prevent errors and improper use of a computer.

11 / 50

The priorities of processes in the __________ group remain fixed.

12 / 50

The bottom layer in the layered approach of Operating System is-----------

13 / 50

The _______ are used for communication between related or unrelated processes on the same system or unrelated processes on different systems.

14 / 50

_________________ scheduling allows a process to move between queues.

15 / 50

In ________ communication the process which wants to communicate with the other process must explicitly name the recipient and the sender.

16 / 50

_________ command to resume the execution of a suspended job in the foreground

17 / 50

In Resource Allocation Graph, A _______ Pi →Rj indicates that process Pi may request resource Rj at some time in the future.

18 / 50

Physical memory is broken down into fixed-sized blocks, called----------- and Logical memory is divided into blocks of the same size, called -----------

19 / 50

In indirect inter process communication, a sender_____mention the name of the recipient.

20 / 50

I/O instructions are Privileged Instructions.

21 / 50

The procedure “The time at which the process finished working MINUS the arrival time of the process MINUS CPU burst for that process” will help calculate the _________.

22 / 50

Time interval when the I/O Devices are accessed is known as --------.

23 / 50

Kernel is responsible for scheduling the user level threads.

24 / 50

________ scheduling algorithm is sometimes called shortest remaining time first scheduling algorithm.

25 / 50

 

IPC provides a mechanism to allow processes to communicate and to synchronize their actions without sharing the same__________

26 / 50

OS helps manages the following except

27 / 50

The manual pages can be read in Linux using ____ command.

28 / 50

What do we name to an address that is loaded into the memory-address register of the memory?

29 / 50

The returned code to the child process after successful fork system call execution is

30 / 50

I MB or 1 megabyte is equivalent to----

31 / 50

n-process critical section problem can be solved by using

32 / 50

_____ system call is used to write to a file or FIFO or any other IPC channel.

33 / 50

___________ algorithm is used in Deadlock avoidance.

34 / 50

Operating System provides services such as Managing Primary and Secondary Storage, Processes and Allowing user to manage his/her files and directories.

35 / 50

If a system is not in a safe state, there can be No deadlocks.

36 / 50

__________ scheduler selects the process from the job pool and put them in main memory.

37 / 50

In deadlock detection and recovery algorithm, a deadlock exists in the system if and only if the wait for graph contains a _____________

38 / 50

The main characteristic of a Real time system is

39 / 50

___________ is used in real time operating systems.

40 / 50

A Process that has finished working, as well as its parent process has also finished its execution. In this state the process A will be called as _________ process.

41 / 50

Operating system enables the user to use the Hardware Resources.

42 / 50

Starvation is infinite blocking caused due to unavailability of resources.

43 / 50

You can use the rm file1 command to __________ file1

44 / 50

rm and [r]mkdir commands are used to _____________ directory.

45 / 50

If the fork system call fails, it returns

46 / 50

_____________ is the basis of queuing theory which is branch of mathematics used to analyze systems involving queues and servers.

47 / 50

The bottom layer in the layered approach of Operating System is-----------

48 / 50

Mach, MacOS X Server, QNX, OS/2 and Windows NT are examples of OS Based on ______.

49 / 50

Binary semaphores are those that have only two values---------

50 / 50

If your processor does not have two slots empty in Per Process File Descriptor Table, then your _________ system call will fail.

Your score is

The average score is 36%

0%

Qunoot e Nazilah
Dua e Hajat
4 Qul
6 Kalma
Dua-e-Akasha
Darood Akbar
Surah Fatiha
Dua-e-Ganj Ul Arsh
Dua-e-Jamilah
Ayat-ul-Kursi