Operating System
Description: Operating System Concepts | |
Number of Questions: 15 | |
Created by: Palash Sundaram | |
Tags: Operating System Operating Systems with Case Study of Unix Computer Science & Information Technology - CS |
Which of the following system calls is a type of information maintenance system call?
Control of nuclear power plants, oil refining and chemical processing are examples of
CPU scheduler is also known as
Which of the following statements is/are true?
I. Real-time operating system does processing according to time interval. II. It has two types: one is hard time and another is soft time operating system. III. In hard real-time systems, secondary storage is not limited. IV. Real-time processing is always online whereas online system need not be real-time.
Which of the following is a system threat?
Find out the wrong statement(s) about scheduler.
I. Short term scheduler is the fastest among the other two. II. Long term scheduler is a part of the time sharing systems. III. Middle term scheduler reduces the degree of multiprogramming. IV. Long term scheduler controls the degree of multiprogramming.
When a program traps user login credentials and stores them to send to malicious user, who can later on login to computer and can access system resources, then it is called
In which partitioning can the space allocations be conveniently handled in sizes of power of 2?
Which of the following methods is used for deadlock prevention?
Identifying each user of the system and associating the executing programs with those users is known as
Formula time (process completed) – time (process submitted) is used for calculating
When a process goes from running state to ready state, then the transition is called
_____ determines where a process piece is to reside in real memory.
A context switch occurs due to interrupt (clock or I/O), trap or system call. If the instruction being executed has any error or exception, it is called
Which of the following is an advantage of time-sharing operating systems?