Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


i want information about real time operating systems
because i have an interview tomoorow in valeo company.



i want information about real time operating systems because i have an interview tomoorow in valeo..

Answer / bhuvan sharma

Real time system is based on time.Simply machine define a
time for a particular process.if that process execute with
in set time then it is successful process otherwise fail.
Real time system has two categories one is soft and other is
hard real time system.In soft real time system process can
access out of time there is no issue but in hard real time
system process must be executed in certain time for example
a robot or we can say rocket launching.

Is This Answer Correct ?    2 Yes 0 No

Post New Answer

More Operating Systems AllOther Interview Questions

Is heap shared between processes?

0 Answers  


Is chrome an operating system?

0 Answers  


1) What is an Virtual memory? 2) How do we test API's in both Windows/Linux/Unix? 3) What is an IOCTL? 4) How do you open a char device through API's? 5) What is major num/ minor num? 6) What is the max num for minor num? 7) Who gives you the major / minor numbers? 8) Reverse a string using recursive func. 9) fork/vfork/clone. 10) What does fork returns? 11) What is a zombie process? 12) What happens when a child completes before parent tries to wait for it? 13) Interrupt handlers, top-hdnl....?

0 Answers   TCS, Wipro,


What is the shortcut key to refresh laptop?

0 Answers  


Where do I find disk cleanup?

0 Answers  


Which intel core is best?

0 Answers  


What happens when I reset my computer?

0 Answers  


How To Enable & Disable Quorum?

0 Answers   IBM,


What is the difference between wget and curl?

0 Answers  


What are compile time Errors?

0 Answers   Akamai Technologies, Impetus, iNautix,


How do I merge folders on mac?

0 Answers  


Assuming one link of the Trojan horse copy-and-observe-later chain is broken. There are two other possible angles of attack by Alice: Alice logging on and attempting to read the string directly, and alice assigning a security level of sensitive to the back-pocket file. Does the reference monitor prevent these attacks?

0 Answers  


Categories