CS604 Midterm Online Quiz

0%

CS604-Midterm

1 / 50

If your processor does not have two slots empty in Per Process File Descriptor Table, then your _________ system call will fail.

2 / 50

n-process critical section problem can be solved by using

3 / 50

___________ is a solution to the problem of indefinite blockage of low-priority processes.

4 / 50

Database, Complier, Video games are examples of ________.

5 / 50

First _______ entries in Per Process File Descriptor Table are used as soon as the process is created.

6 / 50

The main characteristic of a Real time system is

7 / 50

The Top-down view is that it is a program that acts as an intermediary between a user of a computer and the computer hardware, and makes the computer system convenient to use.

8 / 50

A_____ is an abstract key for accessing a file.

9 / 50

The nice value helps in assigning ______ to a process.

10 / 50

If the fork system call fails, it returns

11 / 50

The performance of Round Robin algorithm does NOT depends heavily on the size of the time quantum.

12 / 50

The correct command for compiling C program named program.c in Linux environment is

13 / 50

copy file1 file2 is an example of ______ OS view.

14 / 50

___________ is a piece of code in a cooperating process in which the process may updates shared data (variable, file, database, etc.).

15 / 50

________ scheduling algorithm is sometimes called shortest remaining time first scheduling algorithm.

16 / 50

All threads within a process share the ________ address space.

17 / 50

A Process that has finished working, as well as its parent process has also finished its execution. In this state the process A will be called as _________ process.

18 / 50

Bounded Buffer is a buffer of ____________ size

19 / 50

_________buffer places no practical limit on the size of the buffer

20 / 50

An absolute pathname starts with the root directory (/) and a relative pathname starts with your home directory.

21 / 50

What do we name to an address that is loaded into the memory-address register of the memory?

22 / 50

Linux is a version of _______ operating system.

23 / 50

A ---------------- (or an exception) is a software-generated interrupt caused either by an error (division by zero or invalid memory access) or by a user request for an operating system service.

24 / 50

Users are the People, machines or computers that uses the Hardware resources.

25 / 50

__________ displays information about the top processes.

26 / 50

I/O instructions are Privileged Instructions.

27 / 50

The -------------- system call suspends the calling process.

28 / 50

Which of the following is NOT a Hardware Resource.

29 / 50

_____________ is a preemptive scheduling algorithm.

30 / 50

Operating System is the Manager of Hardware Resources.

31 / 50

The basic purpose of ________________is to help the users to utilize the hardware resources for completing different tasks in a simplified manner

32 / 50

In Layered approach of OS, Lowest Layer is known as ________.

33 / 50

___________ algorithm is used in Deadlock avoidance.

34 / 50

The priorities of processes in the __________ group remain fixed.

35 / 50

The number of processes completed per unit time is called ___________.

36 / 50

A condition where a set of blocked processes each holding a resource and waiting to acquire a resource held by another process in the set is termed as ________.

37 / 50

____ is a virtual directory in Linux and Unix.

38 / 50

_____ system call is used to write to a file or FIFO or any other IPC channel.

39 / 50

POSIX is a standard developed by ANSI

40 / 50

The integer value of ________semaphores can range over an unrestricted integer domain.

41 / 50

Command-line interpreter is also called __________ in some operating systems.

42 / 50

The returned code to the child process after successful fork system call execution is

43 / 50

Preventing a condition of ________ to happen, deadlocks can be prevented to happen.  

44 / 50

In ________ communication the process which wants to communicate with the other process must explicitly name the recipient and the sender.

45 / 50

Round Robin algorithm is similar to ____________ scheduling but preemption is added to switch between processes.

46 / 50

You can use the ------------- command to display the status of suspended and background processes

47 / 50

Which of the following is correct definition for wait operation?

48 / 50

The hardware mechanism that enables a device to notify CPU is called an -------------

49 / 50

The time it takes for the dispatcher to stop one process and start another running is known as the-----------.

50 / 50

/usr/X11R6 is used by the X Window System.

Your score is

The average score is 36%

0%

Qunoot e Nazilah
Dua e Hajat
4 Qul
6 Kalma
Dua-e-Akasha
Darood Akbar
Surah Fatiha
Dua-e-Ganj Ul Arsh
Dua-e-Jamilah
Ayat-ul-Kursi