CS604 Midterm Online Quiz

0%

CS604-Midterm

1 / 50

_____________ is the basis of queuing theory which is branch of mathematics used to analyze systems involving queues and servers.

2 / 50

------------ register contains the size of the process

3 / 50

____ command display the status of a process.

4 / 50

The _______ are used for communication between related or unrelated processes on the same system or unrelated processes on different systems.

5 / 50

___________ is used in real time operating systems.

6 / 50

Swapper is also termed as Short term scheduler.

7 / 50

__________ directory includes essential system boot files including the kernel image.

8 / 50

The integer value of ________semaphores can range over an unrestricted integer domain.

9 / 50

The priority of a process can be changed using ___________ command.

10 / 50

___________ algorithm is used in Deadlock avoidance.

11 / 50

When a process opens its first file explicitly it will get descriptor number _________

12 / 50

If your processor does not have two slots empty in Per Process File Descriptor Table, then your _________ system call will fail.

13 / 50

_____________ is a preemptive scheduling algorithm.

14 / 50

OS helps manages the following except

15 / 50

Kernel is responsible for scheduling the user level threads.

16 / 50

__________ displays information about the top processes.

17 / 50

rm and [r]mkdir commands are used to _____________ directory.

18 / 50

The procedure “The time at which the process finished working MINUS the arrival time of the process MINUS CPU burst for that process” will help calculate the _________.

19 / 50

__________ commands in Linux is used to copy file

20 / 50

Progress and Bounded Waiting are some of the characteristics to solve the critical section problems.

21 / 50

Shared libraries and kernel modules are stored in directory

22 / 50

Users are the People, machines or computers that uses the Hardware resources.

23 / 50

Which of the following is NOT a Hardware Resource.

24 / 50

The following requirement for solving critical section problem is known as ______. “There exists a bound on the number of times that other processes are allowed to enter their critical sections after a process has made a request to enter its critical section and before that request is granted.”

25 / 50

The condition where a set of blocked processes each holding a resource and waiting to acquire a resource held by another process in the set, is termed as ________.

26 / 50

I/O instructions are Privileged Instructions.

27 / 50

The execution of critical sections must NOT be mutually exclusive

28 / 50

The interval from the time of submission to the time of completion is the ______

29 / 50

I MB or 1 megabyte is equivalent to----

30 / 50

Batch programs are usually _________ programs.

31 / 50

Mkfifo() is a _______.

32 / 50

The priorities of processes in the __________ group remain fixed.

33 / 50

POSIX is a standard developed by ANSI

34 / 50

In ________addressing, the recipient is not required to name the sender.

35 / 50

The address generated by the CPU, after any indexing or other addressing-mode arithmetic, is called a --------address, and the address it gets translated to by the MMU is called a ---------address.

36 / 50

A semaphore that cause Busy-Waiting is termed as ___________.

37 / 50

The manual pages can be read in Linux using ____ command.

38 / 50

------------has a hierarchical file system structure.

39 / 50

Mach, MacOS X Server, QNX, OS/2 and Windows NT are examples of OS Based on ______.

40 / 50

You can use the rm file1 command to __________ file1

41 / 50

-------- command gives a snapshot of the current processes.

42 / 50

_____ system call is used to write to a file or FIFO or any other IPC channel.

43 / 50

A program in execution is called a _______________.

44 / 50

You can display all of the signals supported by your system, along with their numbers, by using the -----------command

45 / 50

The Home Directory for superuser in Linux and Unix is

46 / 50

The basic purpose of ________________is to help the users to utilize the hardware resources for completing different tasks in a simplified manner

47 / 50

The -----------scheme is not applicable to a resource allocation system with multiple instances of each resource type.

48 / 50

The Top-down view is that it is a program that acts as an intermediary between a user of a computer and the computer hardware, and makes the computer system convenient to use.

49 / 50

Round Robin algorithm is similar to ____________ scheduling but preemption is added to switch between processes.

50 / 50

_________________ scheduling allows a process to move between queues.

Your score is

The average score is 36%

0%

Qunoot e Nazilah
Dua e Hajat
4 Qul
6 Kalma
Dua-e-Akasha
Darood Akbar
Surah Fatiha
Dua-e-Ganj Ul Arsh
Dua-e-Jamilah
Ayat-ul-Kursi