Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Q1. What is an interrupt? How are multiple interrupts dealt
with?

Q2. Explain the difference between a MONOLITHIC KERNAL and
a MICROKERNAL?

Q3. List reasons why a Mode switch between threads may be
cheaper than a Mode switch between processes.

Q4. What is the difference among deadlock avoidance,
detection and prevention?

Q5. What items of information about a task might be useful
in real time scheduling?

Q6. Discuss some of the reasons for implementing process
migration ?
How is the process address space handled during process
migration?



Q1. What is an interrupt? How are multiple interrupts dealt with? Q2. Explain the difference be..

Answer / hemant chand dungriyal

Ans. When we start to develop a operating system kernal size
is so small but when we start more development in kernal than we add more file or modual in kernal.So our kernal
size is increasing day by day after some time our kernal
size is so big as known as MONOLITHIC KERNAL(in which we
face slow speed problem).
Then developer think and it reduce the kernal size as known
as MICROKERNAL(in which we store some important or necessary
files(without these file computer not run)).

Is This Answer Correct ?    6 Yes 9 No

Post New Answer

More Operating Systems AllOther Interview Questions

How do I change my local disk?

0 Answers  


Assuming one link of the Trojan horse copy-and-observe-later chain is broken. There are two other possible angles of attack by Alice: Alice logging on and attempting to read the string directly, and alice assigning a security level of sensitive to the back-pocket file. Does the reference monitor prevent these attacks?

0 Answers  


What is a semaphore?

20 Answers   Motorola, Persistent, TCS,


what is gr-edge edit?

0 Answers  


What is difference between post and put method?

0 Answers  


Can we compare two files in notepad ++?

0 Answers  


Does redhat use yum?

0 Answers  


What are different errors encountered while compiling?

0 Answers   TCS,


What is difference between kernel and os?

0 Answers  


What happens when I reset my computer?

0 Answers  


Virtual memory size depends on [a] address lines [b] data bus [c] disc space [d] a & c [e] none

15 Answers   Infosys, SafeNet, Satyam, TCS, VIT Infotech, Wipro,


Can I install chrome os on my laptop?

0 Answers  


Categories