In UNIX, a file is represented by an :inode Your Answer inode. A process is waiting to be assigned to CPU then it is said to be in 'waiting state' a state is safe if the system can allocate resources to each process (u pto its maximum) in some order and still avoid a deadlock.
In UNIX, a file is represented by an :inode Your Answer inode. A process is waiting to be assigned to CPU then it is said to be in 'waiting state' a state is safe if the system can allocate resources to each process (u pto its maximum) in some order and still avoid a deadlock.
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as TXT, PDF, TXT or read online from Scribd
In UNIX, a file is represented by an :inode Your Answer inode. A process is waiting to be assigned to CPU then it is said to be in 'waiting state' a state is safe if the system can allocate resources to each process (u pto its maximum) in some order and still avoid a deadlock.
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as TXT, PDF, TXT or read online from Scribd
Correct Answer Inode Your Answer Inode Match The Following Question Correct Answer Your Answer Bounded-buffer Fixed size buffer Fixed size buffer Producer Produces process Produces process Consumer Consumes process Consumes process Unbounded-buffer No limit on size of buffer No limit on size of buffer
Multiple Choice Multiple Answer
Question Find out the human-interface devices :- Correct Answer Screen , Keyboard , Mouse Your Answer Keyboard , Mouse Match The Following Question Correct Answer Your Answer RAM Main Memory Main Memory Monitor mode Supervisor mode Supervisor mode System call Monitor call Monitor call Cache Faster storage Faster storage
Multiple Choice Single Answer
Question If the process is waiting to be assigned to CPU then it is said to be i n :- Correct Answer Ready state Your Answer Waiting state True/False Question Whenever the operating system gains control of the computer, it is in m onitor mode. Correct Answer True Your Answer True Multiple Choice Multiple Answer Question We need two separate modes of operation to protect the operating system and all other programs and their data from malfunctioning program. Which are th ose modes? Correct Answer User mode , Monitor mode Your Answer User mode , Monitor mode Multiple Choice Multiple Answer Question The Linux system is composed of three main bodies of code, in line with most traditional UNIX implementations. Which are :- Correct Answer Kernel , System libraries , System utilities Your Answer Kernel , System libraries , System utilities Multiple Choice Single Answer Question Changing a standard file in UNIX system is known as :- Correct Answer I/O redirection Your Answer I/O redirection Multiple Choice Single Answer Question Each object has a unique :- Correct Answer Name Your Answer Name Select The Blank Question A product is considered ________ if it is significantly less expensive to adopt on new hardware or platform. Correct Answer Portable Your Answer Portable True/False Question A state is safe if the system can allocate resources to each process (u pto its maximum) in some order and still avoid a deadlock. Correct Answer True Your Answer True Select The Blank Question ________ is the ability to handle error conditions, including the abili ty of the operating system to protect itself and its users from defective or mal icious software. Correct Answer Reliability Your Answer Reliability Multiple Choice Multiple Answer Question There are two types of Message passing, they are :- Correct Answer Synchronous , Asynchronous Your Answer Synchronous , Asynchronous Multiple Choice Single Answer Question The wraping up of data and methods in a single unit (class) is known as : Correct Answer Encapsulation Your Answer Encapsulation Multiple Choice Single Answer Question Protection can improve :- Correct Answer Reliability Your Answer Reliability Select The Blank Question In queuing diagram, the arrow indicates the flow of ________ in the sys tem. Correct Answer Processes Your Answer Processes Multiple Choice Multiple Answer Question In a uniprocessor system, there is :- Correct Answer Single processor , Single running process Your Answer Single processor , Single running process , Unique process Multiple Choice Single Answer Question The concept of OOPS was first introduced in Correct Answer Simula Language Your Answer FORTRAN language Select The Blank Question During execution, ________ register holds the sector for the data segme nt. Correct Answer DS Your Answer CS Multiple Choice Single Answer Question In JAVA , the derived class is known as Correct Answer Subclass Your Answer Reference class True/False Question At Physical level, the site or sites containing the computer systems mu st be physically secured against armed or surreptitious entry by intruders. Correct Answer True Your Answer True True/False Question In UNIX, the user refers to a file by a path name, whereas the file sys tem uses the inode as its definition of a file. Correct Answer True Your Answer True Multiple Choice Single Answer Question In MULTICS TLB address of 'n', the most recently referenced pages are k ept, where 'n' can have a value :- Correct Answer 16 Your Answer 16 True/False Question Object-oriented programming focuses on the integrated data and function ality as discrete units that have both knowledge (data) and capabilities (functi ons). Procedural programs, on the other hand, focus on functions and how they ac t on data. Correct Answer True Your Answer True Select The Blank Question ________ describes segments local to each program, including its code, data, stack etc. Correct Answer LDT Your Answer MMU Multiple Choice Multiple Answer Question Memory management system is divided into :- Correct Answer A low level MMU handler , A page fault handler that is part of th e kernel , An external pager running in user space Your Answer A low level MMU handler , An external pager running in user space , Page tracker Multiple Choice Single Answer Question Policies for resource use may vary depending on the :- Correct Answer Application Your Answer Application Select The Blank Question A variation of the Trojan horse is a program that ________ a login prog ram. Correct Answer Emulates Your Answer Emulates True/False Question An unsafe state may lead to a deadlock. Correct Answer True True/False Question LRU algorithm can not be implemented without special hardware. Correct Answer True Your Answer False Multiple Choice Multiple Answer Question The device number consists of which two parts in UNIX? Correct Answer Major device number , Minor device number Your Answer Major device number , Minor device number Multiple Choice Multiple Answer Question Computer system consists of :- Correct Answer CPU , Multiple device controller Your Answer CPU , Multiple device controller , Multiple memory controller Multiple Choice Single Answer Question The main difference between structure and class is Correct Answer Structure does not support OOPS Class Supports OOPS. Your Answer Structure does not support OOPS Class Supports OOPS. Select The Blank Question Each entry in the access matrix consists of a set of ________ . Correct Answer Access right Your Answer Access right Multiple Choice Multiple Answer Question Linux presents standard interfaces to whom? Correct Answer Programmer , User Your Answer Programmer , User Multiple Choice Single Answer Question The separation of policy and mechanism is important for which purpose? Correct Answer Flexibility Your Answer Flexibility Multiple Choice Single Answer Question When computer is powered up or rebooted, it needs to have an initial pr ogram to run. This initial program is known as :- Correct Answer Bootstrap program Your Answer Bootstrap program True/False Question A major security problem for operating system is authentication. Correct Answer True Your Answer False Multiple Choice Multiple Answer Question There are components to the module support under Linux, identify them : - Correct Answer Module management , Driver registration , Conflict-resolution mec hanism Your Answer Module management , Driver registration , Conflict-resolution mechan ism Multiple Choice Multiple Answer Question Once the I/O is started , which two courses of action are possible? Correct Answer Synchronous I/O , Asynchronous I/O , Simple I/O Your Answer Synchronous I/O , Asynchronous I/O True/False Question In evolutionary model, the management activities are emphasised with re spect to inception, elaboration, construction & transition. Correct Answer True Your Answer True Select The Blank Question If the granularity field is ________ the limit field is the exact segme nt size, upto 1 MB. Correct Answer 0 Your Answer 8 Multiple Choice Single Answer Question Policies for resource use may be subject to change over :- Correct Answer Time Your Answer Time True/False Question The principle of polymorphism helps to extend and modify the system sco pe through appropriate messaging mechanism. Correct Answer True Select The Blank Question The processes in the system can execute concurrently, and they must be created and deleted ________ . Correct Answer Dynamically Select The Blank Question In Linux, the allocator uses a ________ algorithm to keep track of avai lable physical pages. Correct Answer Buddy-heap Your Answer Buddy-heap