CS604 Midterm Online Quiz

0%

CS604-Midterm

1 / 50

-------- command gives a snapshot of the current processes.

2 / 50

Operating system enables the user to use the Hardware Resources.

3 / 50

A semaphore that cause Busy-Waiting is termed as .

4 / 50

Linux uses ___________ directory to store system configuration files.

5 / 50

A process consists of __________

6 / 50

_________________ scheduling allows a process to move between queues.

7 / 50

The process of switching from one process to another is called ---------------.

8 / 50

This condition is known as ______________.  

9 / 50

Current working directory can be accessed using --------- Command.

10 / 50

First _______ entries in Per Process File Descriptor Table are used as soon as the process is created.

11 / 50

What do we name to an address that is loaded into the memory-address register of the memory?

12 / 50

The main characteristic of a Real time system is

13 / 50

In ________addressing, the recipient is not required to name the sender.

14 / 50

A Process that has finished working, as well as its parent process has also finished its execution. In this state the process A will be called as _________ process.

15 / 50

The Top-down view is that it is a program that acts as an intermediary between a user of a computer and the computer hardware, and makes the computer system convenient to use.

16 / 50

____ is a virtual directory in Linux and Unix.

17 / 50

Hardware provide basic computing resource.

18 / 50

The -------------- system call suspends the calling process.

19 / 50

___________ is used in real time operating systems.

20 / 50

________ scheduling algorithm is sometimes called shortest remaining time first scheduling algorithm.

21 / 50

Command-line interpreter is also called __________ in some operating systems.

22 / 50

________ determines What will be done.

23 / 50

The critical section problem can be solved by the following except

24 / 50

The ________ requires that once a writer is ready, that writer performs its write as soon as possible , if a writer waiting to access the object, no new readers may start reading.

25 / 50

Bounded Buffer is a buffer of ____________ size

26 / 50

The priority of a process can be changed using ___________ command.

27 / 50

In Resource Allocation Graph, A _______ Pi →Rj indicates that process Pi may request resource Rj at some time in the future.

28 / 50

Mach, MacOS X Server, QNX, OS/2 and Windows NT are examples of OS Based on ______.

29 / 50

-------- command gives a snapshot of the current processes.

30 / 50

The following requirement for solving critical section problem is known as ______. “There exists a bound on the number of times that other processes are allowed to enter their critical sections after a process has made a request to enter its critical section and before that request is granted.”

31 / 50

_______ is also called Swapper.

32 / 50

I/O instructions are Privileged Instructions.

33 / 50

POSIX is a standard developed by ANSI

34 / 50

You can display all of the signals supported by your system, along with their numbers, by using the -----------command

35 / 50

A pathname is the list of directories separated by _________.

36 / 50

The bottom layer in the layered approach of Operating System is-----------

37 / 50

A system call________

38 / 50

____ command display the status of a process.

39 / 50

___________ is a solution to the problem of indefinite blockage of low-priority processes.

40 / 50

DOS is single user operating system.

41 / 50

Preventing a condition of ________ to happen, deadlocks can be prevented to happen.  

42 / 50

__________ displays information about the top processes.

43 / 50

Preemptive ----------------scheduling is sometimes called shortestremaining-time-first scheduling.

44 / 50

In ________ communication the process which wants to communicate with the other process must explicitly name the recipient and the sender.

45 / 50

The interval from the time of submission to the time of completion is the ______

46 / 50

Files that start with a -------- in UNIX/Linux directory structure are known as hidden files .

47 / 50

_____ system call is used to write to a file or FIFO or any other IPC channel.

48 / 50

In ---------addressing; the recipient is not required to name the sender.

49 / 50

The Purpose of Operating System is to generate Executable Programs and to _______ them.

50 / 50

In Unix/ Linux, by default the standard input file is attached to the ___________

Your score is

The average score is 36%

0%

Qunoot e Nazilah
Dua e Hajat
4 Qul
6 Kalma
Dua-e-Akasha
Darood Akbar
Surah Fatiha
Dua-e-Ganj Ul Arsh
Dua-e-Jamilah
Ayat-ul-Kursi