CS604 Midterm Online Quiz

0%

CS604-Midterm

1 / 50

/opt is used for storage of large applications.

2 / 50

Each process must first request permission to enter its critical section. The section of code implementing this request is called the _____

3 / 50

A major problem with priority scheduling algorithms is ______.

4 / 50

A pathname is the list of directories separated by _________.

5 / 50

Batch programs are usually _________ programs.

6 / 50

The Purpose of Operating System is to generate Executable Programs and to _______ them.

7 / 50

The condition where a set of blocked processes each holding a resource and waiting to acquire a resource held by another process in the set, is termed as ________.

8 / 50

Which part of the computer system helps in managing the file and memory management system?

9 / 50

When process opens its first file explicitly it will get descriptor number ______

10 / 50

-------- command gives a snapshot of the current processes.

11 / 50

The priority of a process can be changed using ___________ command.

12 / 50

The process of switching from one process to another is called ---------------.

13 / 50

___________ algorithm is used in Deadlock avoidance.

14 / 50

Preemptive ----------------scheduling is sometimes called shortestremaining-time-first scheduling.

15 / 50

In ---------addressing, the recipient is not required to name the sender.

16 / 50

In Unix/ Linux, by default the standard input file is attached to the ___________

17 / 50

In ________addressing, the recipient is not required to name the sender.

18 / 50

The priorities of processes in the __________ group remain fixed.

19 / 50

Users are the People, machines or computers that uses the Hardware resources.

20 / 50

A process is said to be in critical section if it executes code that manipulates shared data

21 / 50

The Top-down view is that it is a program that acts as an intermediary between a user of a computer and the computer hardware, and makes the computer system convenient to use.

22 / 50

Operating system enables the user to use the Hardware Resources.

23 / 50

In indirect inter process communication, a sender_____mention the name of the recipient.

24 / 50

------------has a hierarchical file system structure.

25 / 50

In Linux directory structure, there is ___________ root directory.

26 / 50

If the fork system call fails, it returns

27 / 50

A condition where a set of blocked processes each holding a resource and waiting to acquire a resource held by another process in the set is termed as ________.

28 / 50

If the system can allocate resources to each process in some order and still avoid a deadlock then it said to be in ______ state.

29 / 50

Managing Secondary Storage Involves all of the Following except

30 / 50

Linux Treats Devices as Files.

31 / 50

Physical memory is broken down into fixed-sized blocks, called----------- and Logical memory is divided into blocks of the same size, called -----------

32 / 50

The bottom layer in the layered approach of Operating System is-----------

33 / 50

------------ register contains the size of the process

34 / 50

Linux is a version of _______ operating system.

35 / 50

You can use the ---------command in UNIX to create a directory.

36 / 50

A dashed line is used to represent a _________ in Resource Allocation Graph.

37 / 50

Time interval when the I/O Devices are accessed is known as --------.

38 / 50

Kernel is responsible for scheduling the user level threads.

39 / 50

What do we name to an address that is loaded into the memory-address register of the memory?

40 / 50

DOS is single user operating system.

41 / 50

OS helps manages the following except

42 / 50

________ determines What will be done.

43 / 50

Utilities used for system administration (halt, ifconfig, fdisk, etc.) are stored in _____________ directory.

44 / 50

___________ is a piece of code in a cooperating process in which the process may updates shared data (variable, file, database, etc.).

45 / 50

Database, Complier, Video games are examples of ________.

46 / 50

Preventing a condition of ________ to happen, deadlocks can be prevented to happen.  

47 / 50

_________buffer places no practical limit on the size of the buffer

48 / 50

The manual pages can be read in Linux using ____ command.

49 / 50

command displays the contents of current working directory.

50 / 50

The Operating system is a layer of software between _________ and ___________.

Your score is

The average score is 36%

0%

Qunoot e Nazilah
Dua e Hajat
4 Qul
6 Kalma
Dua-e-Akasha
Darood Akbar
Surah Fatiha
Dua-e-Ganj Ul Arsh
Dua-e-Jamilah
Ayat-ul-Kursi