CS604 Midterm Online Quiz

0%

CS604-Midterm

1 / 50

Preemptive ----------------scheduling is sometimes called shortestremaining-time-first scheduling.

2 / 50

___________ is used in real time operating systems.

3 / 50

______scheduler selects the process from the job pool and put them in main memory.

4 / 50

_________________ scheduling allows a process to move between queues.

5 / 50

A_____ is an abstract key for accessing a file.

6 / 50

The performance of Round Robin algorithm does NOT depends heavily on the size of the time quantum.

7 / 50

The procedure “The time at which the process finished working MINUS the arrival time of the process MINUS CPU burst for that process” will help calculate the _________.

8 / 50

________________ is an integer variable accessible through wait and signal which are atomic operations.

9 / 50

Bounded Buffer is a buffer of ____________ size

10 / 50

The following requirement for solving critical section problem is known as ______. “There exists a bound on the number of times that other processes are allowed to enter their critical sections after a process has made a request to enter its critical section and before that request is granted.”

11 / 50

The Top-down view is that it is a program that acts as an intermediary between a user of a computer and the computer hardware, and makes the computer system convenient to use.

12 / 50

The number of processes completed per unit time is called ___________.

13 / 50

Hardware provide basic computing resource.

14 / 50

If a system is not in a safe state, there can be No deadlocks.

15 / 50

First _______ entries in Per Process File Descriptor Table are used as soon as the process is created.

16 / 50

The process of switching from one process to another is called ---------------.

17 / 50

Which part of the computer system helps in managing the file and memory management system?

18 / 50

Preventing a condition of ________ to happen, deadlocks can be prevented to happen.  

19 / 50

In ---------addressing, the recipient is not required to name the sender.

20 / 50

In ________addressing, the recipient is not required to name the sender.

21 / 50

Linux is a version of _______ operating system.

22 / 50

When a process opens its first file explicitly it will get descriptor number _________

23 / 50

_____________ determines How to do something.

24 / 50

Current working directory can be accessed using --------- Command.

25 / 50

The time it takes for the dispatcher to stop one process and start another running is known as the-----------.

26 / 50

____ is a virtual directory in Linux and Unix.

27 / 50

All threads within a process share the ________ address space.

28 / 50

------------ register contains the size of the process

29 / 50

Cooperating processes never share any data, code, memory or state.

30 / 50

In Layered Approach of OS, the Layer highest Layer is User Interface layer.

31 / 50

/usr/X11R6 is used by the X Window System.

32 / 50

In ________ communication the process which wants to communicate with the other process must explicitly name the recipient and the sender.

33 / 50

Time interval when the I/O Devices are accessed is known as --------.

34 / 50

Binary semaphores are those that have only two values---------

35 / 50

The correct command for compiling C program named program.c in Linux environment is

36 / 50

Cache is non-volatile memory.

37 / 50

The process of switching from one process to another is called latency.

38 / 50

The execution of critical sections must NOT be mutually exclusive

39 / 50

Progress and Bounded Waiting are some of the characteristics to solve the critical section problems.

40 / 50

__________ commands in Linux is used to copy file

41 / 50

____ command gives a snapshot of the current processes.

42 / 50

The manual pages can be read in Linux using ____ command.

43 / 50

In Resource Allocation Graph, A _______ Pi →Rj indicates that process Pi may request resource Rj at some time in the future.

44 / 50

The returned code to the child process after successful fork system call execution is

45 / 50

_____ system call is used to write to a file or FIFO or any other IPC channel.

46 / 50

Operating System provides services such as Managing Primary and Secondary Storage, Processes and Allowing user to manage his/her files and directories.

47 / 50

Physical memory is broken down into fixed-sized blocks, called----------- and Logical memory is divided into blocks of the same size, called -----------

48 / 50

___________ algorithm is used in Deadlock avoidance.

49 / 50

A parent process calling __________ system call will be suspended until children process terminates.

50 / 50

When process opens its first file explicitly it will get descriptor number ______

Your score is

The average score is 36%

0%

Qunoot e Nazilah
Dua e Hajat
4 Qul
6 Kalma
Dua-e-Akasha
Darood Akbar
Surah Fatiha
Dua-e-Ganj Ul Arsh
Dua-e-Jamilah
Ayat-ul-Kursi