CS604-Midterm
1 / 50
A solution to the critical section problem must satisfy the following requirements
2 / 50
The procedure “The time at which the process finished working MINUS the arrival time of the process MINUS CPU burst for that process” will help calculate the _________.
3 / 50
_____ system call is used to write to a file or FIFO or any other IPC channel.
4 / 50
___________ algorithm is used in Deadlock avoidance.
5 / 50
_________ command to resume the execution of a suspended job in the foreground
6 / 50
When process opens its first file explicitly it will get descriptor number ______
7 / 50
Round Robin algorithm is similar to ____________ scheduling but preemption is added to switch between processes.
8 / 50
The interval from the time of submission to the time of completion is the ______
9 / 50
Hardware provide basic computing resource.
10 / 50
In ________addressing, the recipient is not required to name the sender.
11 / 50
--------------command to resume the execution of a suspended job in the foreground
12 / 50
An absolute pathname starts with the root directory (/) and a relative pathname starts with your home directory.
13 / 50
If the system can allocate resources to each process in some order and still avoid a deadlock then it said to be in ______ state.
14 / 50
The bottom layer in the layered approach of Operating System is-----------
15 / 50
A dashed line is used to represent a _________ in Resource Allocation Graph.
16 / 50
The correct command for compiling C program named program.c in Linux environment is
17 / 50
A parent process calling __________ system call will be suspended until children process terminates.
18 / 50
__________ displays information about the top processes.
19 / 50
In ---------addressing; the recipient is not required to name the sender.
20 / 50
Mkfifo() is a _______.
21 / 50
You can use the ------------- command to display the status of suspended and background processes
22 / 50
Physical memory is broken down into fixed-sized blocks, called----------- and Logical memory is divided into blocks of the same size, called -----------
23 / 50
Linux Treats Devices as Files.
24 / 50
Operating system enables the user to use the Hardware Resources.
25 / 50
In indirect inter process communication, a sender ________ mention the name of the recipient.
26 / 50
__________ integer shows the highest priority of a process in CPU scheduling
27 / 50
IPC provides a mechanism to allow processes to communicate and to synchronize their actions without sharing the same__________
28 / 50
Banker‟s algorithm is used for ________________
29 / 50
User mode can run the Privileged instructions.
30 / 50
All threads within a process share the ________ address space.
31 / 50
Which part of the computer system helps in managing the file and memory management system?
32 / 50
n-process critical section problem can be solved by using
33 / 50
Mach, MacOS X Server, QNX, OS/2 and Windows NT are examples of OS Based on ______.
34 / 50
The Top-down view is that it is a program that acts as an intermediary between a user of a computer and the computer hardware, and makes the computer system convenient to use.
35 / 50
A major problem with priority scheduling algorithms is ______.
36 / 50
/usr/X11R6 is used by the X Window System.
37 / 50
/opt is used for storage of large applications.
38 / 50
Files that start with a -------- in UNIX/Linux directory structure are known as hidden files .
39 / 50
rm and [r]mkdir commands are used to _____________ directory.
40 / 50
An operating system is a control program that manages the execution of user programs to prevent errors and improper use of a computer.
41 / 50
Bounded Buffer is a buffer of ____________ size
42 / 50
You can use the rm file1 command to __________ file1
43 / 50
copy file1 file2 is an example of ______ OS view.
44 / 50
You can display all of the signals supported by your system, along with their numbers, by using the -----------command
45 / 50
The scheduling of ______ are done by the operating system.
46 / 50
Which of the Following is not an Operating System.
47 / 50
In Linux directory structure, there is ___________ root directory.
48 / 50
_______ is also called Swapper.
49 / 50
Users are the People, machines or computers that uses the Hardware resources.
50 / 50
POSIX is a standard developed by ANSI
Your score is
The average score is 36%
Restart quiz