CS604-Midterm
1 / 50
A pathname is the list of directories separated by _________.
2 / 50
If a system is not in a safe state, there can be No deadlocks.
3 / 50
The time it takes for the dispatcher to stop one process and start another running is known as the-----------.
4 / 50
First _______ entries in Per Process File Descriptor Table are used as soon as the process is created.
5 / 50
_____________ is the basis of queuing theory which is branch of mathematics used to analyze systems involving queues and servers.
6 / 50
In deadlock detection and recovery algorithm, a deadlock exists in the system if and only if the wait for graph contains a _____________
7 / 50
Each page is a power of -------- bytes long in paging scheme.
8 / 50
We can install and run multiple OS by using VMWare.
9 / 50
________ determines What will be done.
10 / 50
Command-line interpreter is also called __________ in some operating systems.
11 / 50
__________ integer shows the highest priority of a process in CPU scheduling
12 / 50
/opt is used for storage of large applications.
13 / 50
__________ commands in Linux is used to copy file
14 / 50
A process is said to be in critical section if it executes code that manipulates shared data
15 / 50
In ________addressing, the recipient is not required to name the sender.
16 / 50
In ---------addressing, the recipient is not required to name the sender.
17 / 50
The Top-down view is that it is a program that acts as an intermediary between a user of a computer and the computer hardware, and makes the computer system convenient to use.
18 / 50
_________ command to resume the execution of a suspended job in the foreground
19 / 50
DOS is single user operating system.
20 / 50
The process of holding at least one resource and waiting to acquire additional resources that are currently being held by other processes is known as________.
21 / 50
In indirect inter process communication, a sender_____mention the name of the recipient.
22 / 50
Mach, MacOS X Server, QNX, OS/2 and Windows NT are examples of OS Based on ______.
23 / 50
What do we name to an address that is loaded into the memory-address register of the memory?
24 / 50
Banker‟s algorithm is used for ________________
25 / 50
Which part of the computer system helps in managing the file and memory management system?
26 / 50
Managing Secondary Storage Involves all of the Following except
27 / 50
The major advantage of multi-programming system is
28 / 50
Hardware provide basic computing resource.
29 / 50
When process opens its first file explicitly it will get descriptor number ______
30 / 50
Database, Complier, Video games are examples of ________.
31 / 50
Shared libraries and kernel modules are stored in directory
32 / 50
__________ directory includes essential system boot files including the kernel image.
33 / 50
User mode can run the Privileged instructions.
34 / 50
This condition is known as ______________.
35 / 50
Progress and Bounded Waiting are some of the characteristics to solve the critical section problems.
36 / 50
If your processor does not have two slots empty in Per Process File Descriptor Table, then your _________ system call will fail.
37 / 50
A time sharing system is
38 / 50
The bottom layer in the layered approach of Operating System is-----------
39 / 50
The main characteristic of a Real time system is
40 / 50
The Purpose of Operating System is to generate Executable Programs and to _______ them.
41 / 50
The priority of a process can be changed using ___________ command.
42 / 50
A Process that has finished working, as well as its parent process has also finished its execution. In this state the process A will be called as _________ process.
43 / 50
OS helps manages the following except
44 / 50
The process id returned to the child process after successful fork system call execution is _____________.
45 / 50
The execution of critical sections must NOT be mutually exclusive
46 / 50
A parent process calling __________ system call will be suspended until children process terminates.
47 / 50
Each process must first request permission to enter its critical section. The section of code implementing this request is called the _____
48 / 50
_________buffer places no practical limit on the size of the buffer
49 / 50
_________________ scheduling allows a process to move between queues.
50 / 50
copy file1 file2 is an example of ______ OS view.
Your score is
The average score is 36%
Restart quiz