CS604 Midterm Online Quiz

0%

CS604-Midterm

1 / 50

The following requirement for solving critical section problem is known as ______. “There exists a bound on the number of times that other processes are allowed to enter their critical sections after a process has made a request to enter its critical section and before that request is granted.”

2 / 50

The bottom layer in the layered approach of Operating System is-----------

3 / 50

Users are the People, machines or computers that uses the Hardware resources.

4 / 50

The priorities of processes in the __________ group remain fixed.

5 / 50

You can display all of the signals supported by your system, along with their numbers, by using the -----------command

6 / 50

A dashed line is used to represent a _________ in Resource Allocation Graph.

7 / 50

In ________ communication the process which wants to communicate with the other process must explicitly name the recipient and the sender.

8 / 50

A ---------------- (or an exception) is a software-generated interrupt caused either by an error (division by zero or invalid memory access) or by a user request for an operating system service.

9 / 50

--------------command to resume the execution of a suspended job in the foreground

10 / 50

In ---------addressing, the recipient is not required to name the sender.

11 / 50

The address generated by the CPU, after any indexing or other addressing-mode arithmetic, is called a --------address, and the address it gets translated to by the MMU is called a ---------address.

12 / 50

 

IPC provides a mechanism to allow processes to communicate and to synchronize their actions without sharing the same__________

13 / 50

A Process „A‟ that has finished working but its parent process has also finished its execution. In this state the process „A‟ will be called as _____ process.

14 / 50

___________ algorithm is used in Deadlock avoidance.

15 / 50

Each process must first request permission to enter its critical section. The section of code implementing this request is called the _____

16 / 50

The priority of a process can be changed using ___________ command.

17 / 50

Which of the following is correct definition for wait operation?

18 / 50

You can create a threads by using the pthread_create() call.

19 / 50

Linux is a version of _______ operating system.

20 / 50

In Layered approach of OS, Lowest Layer is known as ________.

21 / 50

__________ scheduler selects the process from the job pool and put them in main memory.

22 / 50

In deadlock detection and recovery algorithm, a deadlock exists in the system if and only if the wait for graph contains a _____________

23 / 50

------------ register contains the size of the process

24 / 50

First-Come, First-Served (FCFS) is a --------------scheduling algorithm.

25 / 50

The Shortest-Job-First Scheduling algorithm can be

26 / 50

A_____ is an abstract key for accessing a file.

27 / 50

Which of the Following is not an Operating System.

28 / 50

If the fork system call fails, it returns

29 / 50

Files that start with a -------- in UNIX/Linux directory structure are known as hidden files .

30 / 50

-------- command gives a snapshot of the current processes.

31 / 50

Preemptive ----------------scheduling is sometimes called shortestremaining-time-first scheduling.

32 / 50

Operating system enables the user to use the Hardware Resources.

33 / 50

Starvation is infinite blocking caused due to unavailability of resources.

34 / 50

Mach, MacOS X Server, QNX, OS/2 and Windows NT are examples of OS Based on ______.

35 / 50

The major advantage of multi-programming system is

36 / 50

Physical memory is broken down into fixed-sized blocks, called----------- and Logical memory is divided into blocks of the same size, called -----------

37 / 50

Swapper is also termed as Short term scheduler.

38 / 50

The basic purpose of ________________is to help the users to utilize the hardware resources for completing different tasks in a simplified manner

39 / 50

The manual pages can be read in Linux using ____ command.

40 / 50

Each page is a power of -------- bytes long in paging scheme.

41 / 50

You can use the ------------- command to display the status of suspended and background processes

42 / 50

/usr/X11R6 is used by the X Window System.

43 / 50

First _______ entries in Per Process File Descriptor Table are used as soon as the process is created.

44 / 50

In ________addressing, the recipient is not required to name the sender.

45 / 50

Cooperating processes never share any data, code, memory or state.

46 / 50

Linux uses ___________ directory to store system configuration files.

47 / 50

Operating System provides services such as Managing Primary and Secondary Storage, Processes and Allowing user to manage his/her files and directories.

48 / 50

User mode can run the Privileged instructions.

49 / 50

Time interval when the I/O Devices are accessed is known as --------.

50 / 50

A solution to the critical section problem must satisfy the following requirements

Your score is

The average score is 36%

0%

Qunoot e Nazilah
Dua e Hajat
4 Qul
6 Kalma
Dua-e-Akasha
Darood Akbar
Surah Fatiha
Dua-e-Ganj Ul Arsh
Dua-e-Jamilah
Ayat-ul-Kursi