Operating Systems Interview Questions
Questions Answers Views Company eMail

Assume that passwords are selected from four-character combinations of 26 alphabetic characters. Assume that an adversary is able to attempt passwords at a rate of one per second. a) Assuming no feedback to the adversary until each attempt has been completed, what is the expected time to discover the correct password?

FCI,

4 17517

Assuming feedback to the adversary flugging an error as each incorrect character is entered, what is the expected time to discover the correct password?

2857

Assuming one link of the Trojan horse copy-and-observe-later chain is broken. There are two other possible angles of attack by Alice: Alice logging on and attempting to read the string directly, and alice assigning a security level of sensitive to the back-pocket file. Does the reference monitor prevent these attacks?

2383

The flushing policy is described in the subsection on process migration strategies: a) From the perspective of the source, which other strategy does flushing resembles? b) From the perspective of the target, which other strategy does flushing resemble?

1808

Directories can be implemented either as "special files" that can only be accessed in limited ways, or as ordinary data files. What are the advantages and disadvantages of each approach?

4006

Some operating system have a tree structured file system but limits the depth of the tree to some small number of levels. what effect does this limit have on users? How does this simplify file system (if it does)?

1 8012

In the token-passing mutual exclusion algorithm, is the timestamping used to reset clocks and correct drifts, as in the distributed queue algorithms? if not, what is the function of the timestamping?

HCL,

2273

How to use disk quotas in solaris (command mode) ? what is the procedure for checking disk space of the particular user in command mode?

Samsung,

7 17454

what is the back up software we r using in solaris 8,9,10

2 4896

what is windows installer

IBM, Metropolitan Health Group, Microsoft,

2 5645

what is windows installer?

2 5467

1)application programs interact with operating system through system call.is there any method of interaction between the two? 2) Inconveniences faced by user interacting with a computer systemwithout a operating system? 3) what are the requirements for virtual memory architecture

KCPL,

2 3696

how does virtual memory work?

1 5503

What is the reason for getting the dialouge box( send this error to microsoft giving options as send to microsoft and dont send ) when we abort from the any work when it was struck.

CTS, HCL,

1 4010

what are the features of Linux?

2 6520


Un-Answered Questions { Operating Systems }

Which is the best operating system for pc?

534


Which linux is android based on?

426


What are device drivers in os?

527


Can I put linux on my laptop?

444


What are Odm Commands.

617






Under what circumstances do page faults occur? Describe the actions taken by the operating system when a page fault occurs?

577


What is the ie tab in google chrome?

505


What resources are used when a thread created? How do they differ from those when a process is created?

518


Is windows live mail being discontinued?

455


How do you check disk?

476


Can you run 32 bit applications on a 64 bit operating system?

466


how will you mount an ntfs partition in linux?

484


What happens if your hard drive is corrupted?

454


Why is arraylist faster than linkedlist?

502


How will you unmirrored a vg if a pv gets failed?

5