CS604-Midterm
1 / 50
Linux uses ___________ directory to store system configuration files.
2 / 50
The following requirement for solving critical section problem is known as ______. “There exists a bound on the number of times that other processes are allowed to enter their critical sections after a process has made a request to enter its critical section and before that request is granted.”
3 / 50
The basic purpose of ________________is to help the users to utilize the hardware resources for completing different tasks in a simplified manner
4 / 50
The main characteristic of a Real time system is
5 / 50
The integer value of ________semaphores can range over an unrestricted integer domain.
6 / 50
Starvation is infinite blocking caused due to unavailability of resources.
7 / 50
You can display all of the signals supported by your system, along with their numbers, by using the -----------command
8 / 50
A system call________
9 / 50
The correct command for compiling C program named program.c in Linux environment is
10 / 50
The process of switching from one process to another is called ---------------.
11 / 50
The execution of critical sections must NOT be mutually exclusive
12 / 50
The _______ are used for communication between related or unrelated processes on the same system or unrelated processes on different systems.
13 / 50
Each process must first request permission to enter its critical section. The section of code implementing this request is called the _____
14 / 50
------------ register contains the size of the process
15 / 50
We can install and run multiple OS by using VMWare.
16 / 50
The priority of a process can be changed using ___________ command.
17 / 50
The interval from the time of submission to the time of completion is the ______
18 / 50
In ________addressing, the recipient is not required to name the sender.
19 / 50
Which of the following is NOT a Hardware Resource.
20 / 50
The critical section problem can be solved by the following except
21 / 50
Users are the People, machines or computers that uses the Hardware resources.
22 / 50
Preventing a condition of ________ to happen, deadlocks can be prevented to happen.
23 / 50
Bounded Buffer is a buffer of ____________ size
24 / 50
First-Come, First-Served (FCFS) is a --------------scheduling algorithm.
25 / 50
The process of holding at least one resource and waiting to acquire additional resources that are currently being held by other processes is known as________.
26 / 50
The ________ requires that once a writer is ready, that writer performs its write as soon as possible , if a writer waiting to access the object, no new readers may start reading.
27 / 50
The bottom layer in the layered approach of Operating System is-----------
28 / 50
User Goal of OS is that It easy to use, reliable, safe and fast.
29 / 50
OS helps manages the following except
30 / 50
A_______ is an integer variable that, apart from initialization is accessible only through two standard atomic operations: wait and signal.
31 / 50
Hardware provide basic computing resource.
32 / 50
Operating System provides services such as Managing Primary and Secondary Storage, Processes and Allowing user to manage his/her files and directories.
33 / 50
You can use the rm file1 command to __________ file1
34 / 50
Current working directory can be accessed using --------- Command.
35 / 50
Mach, MacOS X Server, QNX, OS/2 and Windows NT are examples of OS Based on ______.
36 / 50
A Process „A‟ that has finished working but its parent process has also finished its execution. In this state the process „A‟ will be called as _____ process.
37 / 50
________________ is an integer variable accessible through wait and signal which are atomic operations.
38 / 50
All threads within a process share the ________ address space.
39 / 50
A semaphore that cause Busy-Waiting is termed as ___________.
40 / 50
The priorities of processes in the __________ group remain fixed.
41 / 50
copy file1 file2 is an example of ______ OS view.
42 / 50
Cache is non-volatile memory.
43 / 50
A pathname is the list of directories separated by _________.
44 / 50
___________ algorithm is used in Deadlock avoidance.
45 / 50
Linux Treats Devices as Files.
46 / 50
A condition where a set of blocked processes each holding a resource and waiting to acquire a resource held by another process in the set is termed as ________.
47 / 50
In deadlock detection and recovery algorithm, a deadlock exists in the system if and only if the wait for graph contains a _____________
48 / 50
The nice value helps in assigning ______ to a process.
49 / 50
An operating system is a control program that manages the execution of user programs to prevent errors and improper use of a computer.
50 / 50
The Operating system is a layer of software between _________ and ___________.
Your score is
The average score is 36%
Restart quiz