CS604-Midterm
1 / 50
Preemptive ----------------scheduling is sometimes called shortestremaining-time-first scheduling.
2 / 50
___________ is used in real time operating systems.
3 / 50
______scheduler selects the process from the job pool and put them in main memory.
4 / 50
_________________ scheduling allows a process to move between queues.
5 / 50
A_____ is an abstract key for accessing a file.
6 / 50
The performance of Round Robin algorithm does NOT depends heavily on the size of the time quantum.
7 / 50
The procedure “The time at which the process finished working MINUS the arrival time of the process MINUS CPU burst for that process” will help calculate the _________.
8 / 50
________________ is an integer variable accessible through wait and signal which are atomic operations.
9 / 50
Bounded Buffer is a buffer of ____________ size
10 / 50
The following requirement for solving critical section problem is known as ______. “There exists a bound on the number of times that other processes are allowed to enter their critical sections after a process has made a request to enter its critical section and before that request is granted.”
11 / 50
The Top-down view is that it is a program that acts as an intermediary between a user of a computer and the computer hardware, and makes the computer system convenient to use.
12 / 50
The number of processes completed per unit time is called ___________.
13 / 50
Hardware provide basic computing resource.
14 / 50
If a system is not in a safe state, there can be No deadlocks.
15 / 50
First _______ entries in Per Process File Descriptor Table are used as soon as the process is created.
16 / 50
The process of switching from one process to another is called ---------------.
17 / 50
Which part of the computer system helps in managing the file and memory management system?
18 / 50
Preventing a condition of ________ to happen, deadlocks can be prevented to happen.
19 / 50
In ---------addressing, the recipient is not required to name the sender.
20 / 50
In ________addressing, the recipient is not required to name the sender.
21 / 50
Linux is a version of _______ operating system.
22 / 50
When a process opens its first file explicitly it will get descriptor number _________
23 / 50
_____________ determines How to do something.
24 / 50
Current working directory can be accessed using --------- Command.
25 / 50
The time it takes for the dispatcher to stop one process and start another running is known as the-----------.
26 / 50
____ is a virtual directory in Linux and Unix.
27 / 50
All threads within a process share the ________ address space.
28 / 50
------------ register contains the size of the process
29 / 50
Cooperating processes never share any data, code, memory or state.
30 / 50
In Layered Approach of OS, the Layer highest Layer is User Interface layer.
31 / 50
/usr/X11R6 is used by the X Window System.
32 / 50
In ________ communication the process which wants to communicate with the other process must explicitly name the recipient and the sender.
33 / 50
Time interval when the I/O Devices are accessed is known as --------.
34 / 50
Binary semaphores are those that have only two values---------
35 / 50
The correct command for compiling C program named program.c in Linux environment is
36 / 50
Cache is non-volatile memory.
37 / 50
The process of switching from one process to another is called latency.
38 / 50
The execution of critical sections must NOT be mutually exclusive
39 / 50
Progress and Bounded Waiting are some of the characteristics to solve the critical section problems.
40 / 50
__________ commands in Linux is used to copy file
41 / 50
____ command gives a snapshot of the current processes.
42 / 50
The manual pages can be read in Linux using ____ command.
43 / 50
In Resource Allocation Graph, A _______ Pi →Rj indicates that process Pi may request resource Rj at some time in the future.
44 / 50
The returned code to the child process after successful fork system call execution is
45 / 50
_____ system call is used to write to a file or FIFO or any other IPC channel.
46 / 50
Operating System provides services such as Managing Primary and Secondary Storage, Processes and Allowing user to manage his/her files and directories.
47 / 50
Physical memory is broken down into fixed-sized blocks, called----------- and Logical memory is divided into blocks of the same size, called -----------
48 / 50
___________ algorithm is used in Deadlock avoidance.
49 / 50
A parent process calling __________ system call will be suspended until children process terminates.
50 / 50
When process opens its first file explicitly it will get descriptor number ______
Your score is
The average score is 36%
Restart quiz