CS604 Midterm Online Quiz

0%

CS604-Midterm

1 / 50

A pathname is the list of directories separated by _________.

2 / 50

If a system is not in a safe state, there can be No deadlocks.

3 / 50

The time it takes for the dispatcher to stop one process and start another running is known as the-----------.

4 / 50

First _______ entries in Per Process File Descriptor Table are used as soon as the process is created.

5 / 50

_____________ is the basis of queuing theory which is branch of mathematics used to analyze systems involving queues and servers.

6 / 50

In deadlock detection and recovery algorithm, a deadlock exists in the system if and only if the wait for graph contains a _____________

7 / 50

Each page is a power of -------- bytes long in paging scheme.

8 / 50

We can install and run multiple OS by using VMWare.

9 / 50

________ determines What will be done.

10 / 50

Command-line interpreter is also called __________ in some operating systems.

11 / 50

__________ integer shows the highest priority of a process in CPU scheduling

12 / 50

/opt is used for storage of large applications.

13 / 50

__________ commands in Linux is used to copy file

14 / 50

A process is said to be in critical section if it executes code that manipulates shared data

15 / 50

In ________addressing, the recipient is not required to name the sender.

16 / 50

In ---------addressing, the recipient is not required to name the sender.

17 / 50

The Top-down view is that it is a program that acts as an intermediary between a user of a computer and the computer hardware, and makes the computer system convenient to use.

18 / 50

_________ command to resume the execution of a suspended job in the foreground

19 / 50

DOS is single user operating system.

20 / 50

The process of holding at least one resource and waiting to acquire additional resources that are currently being held by other processes is known as________.  

21 / 50

In indirect inter process communication, a sender_____mention the name of the recipient.

22 / 50

Mach, MacOS X Server, QNX, OS/2 and Windows NT are examples of OS Based on ______.

23 / 50

What do we name to an address that is loaded into the memory-address register of the memory?

24 / 50

Banker‟s algorithm is used for ________________

25 / 50

Which part of the computer system helps in managing the file and memory management system?

26 / 50

Managing Secondary Storage Involves all of the Following except

27 / 50

The major advantage of multi-programming system is

28 / 50

Hardware provide basic computing resource.

29 / 50

When process opens its first file explicitly it will get descriptor number ______

30 / 50

Database, Complier, Video games are examples of ________.

31 / 50

Shared libraries and kernel modules are stored in directory

32 / 50

__________ directory includes essential system boot files including the kernel image.

33 / 50

User mode can run the Privileged instructions.

34 / 50

This condition is known as ______________.  

35 / 50

Progress and Bounded Waiting are some of the characteristics to solve the critical section problems.

36 / 50

If your processor does not have two slots empty in Per Process File Descriptor Table, then your _________ system call will fail.

37 / 50

A time sharing system is

38 / 50

The bottom layer in the layered approach of Operating System is-----------

39 / 50

The main characteristic of a Real time system is

40 / 50

The Purpose of Operating System is to generate Executable Programs and to _______ them.

41 / 50

The priority of a process can be changed using ___________ command.

42 / 50

A Process that has finished working, as well as its parent process has also finished its execution. In this state the process A will be called as _________ process.

43 / 50

OS helps manages the following except

44 / 50

The process id returned to the child process after successful fork system call execution is _____________.

45 / 50

The execution of critical sections must NOT be mutually exclusive

46 / 50

A parent process calling __________ system call will be suspended until children process terminates.

47 / 50

Each process must first request permission to enter its critical section. The section of code implementing this request is called the _____

48 / 50

_________buffer places no practical limit on the size of the buffer

49 / 50

_________________ scheduling allows a process to move between queues.

50 / 50

copy file1 file2 is an example of ______ OS view.

Your score is

The average score is 36%

0%

Qunoot e Nazilah
Dua e Hajat
4 Qul
6 Kalma
Dua-e-Akasha
Darood Akbar
Surah Fatiha
Dua-e-Ganj Ul Arsh
Dua-e-Jamilah
Ayat-ul-Kursi