Operating Systems AllOther Interview Questions
Questions Answers Views Company eMail

Method used for Disk searching.. a.linked list b.AVL c.B-tree d. binary tree

Hughes, KKR,

3 7412

which one of following is not memory management model? choices are buddy system, monitors, paging, swapping

Satyam, Hughes,

6 7161

One solution for deadlock prevention for dining philosopher's problem

Hughes,

3 6772




Which of following is used for back-up files? (a) compress (b) Tar (c) make (d) all the above

Cadence,

1 3238

In the process table entry for the kernel process, the process id value is a) 0 b) 1 c) 2 d) 255 e) it does not have a process table entry

IBM, Aspire, Saigun Technologies,

4 11639

One Gigabyte =?( 2 power30 , 2 power 20 ,2 power 10 none)

Mascot,

4 7799

DMA - abbrevation (Direct Memory Access,Discrete memory Access,Disk memoryaccess)

Mascot,

4 4046

How does the scheduler know the time how it should be scheduled.

Motorola,

1 5759




What is deadlock? How do you avoid it?

Motorola, HCL,

9 46406

What is a semaphore?

TCS, Persistent, Motorola,

20 40467

Virtual memory size depends on [a] address lines [b] data bus [c] disc space [d] a & c [e] none

Wipro, Satyam, Infosys, TCS, SafeNet, VIT Infotech,

15 23389

what are Prerequisites to Install Active Directory in windows 2000 server?

ISL,

3 3928

Which is your favorite editor, shell, programming shell and why?

TCS,

1440

What operating systems provide threads?

5 3915

What is TSY?

CMC, TATA, Samsung,

4 6340


Post New Operating Systems AllOther Questions






Un-Answered Questions { Operating Systems AllOther }

What is the latest version of google browser?

4


In the token-passing mutual exclusion algorithm, is the timestamping used to reset clocks and correct drifts, as in the distributed queue algorithms? if not, what is the function of the timestamping?

1719


What are the Types Of Vg & Explain About Them?

7


1) What is an Virtual memory? 2) How do we test API's in both Windows/Linux/Unix? 3) What is an IOCTL? 4) How do you open a char device through API's? 5) What is major num/ minor num? 6) What is the max num for minor num? 7) Who gives you the major / minor numbers? 8) Reverse a string using recursive func. 9) fork/vfork/clone. 10) What does fork returns? 11) What is a zombie process? 12) What happens when a child completes before parent tries to wait for it? 13) Interrupt handlers, top-hdnl....?

1347


Assuming feedback to the adversary flugging an error as each incorrect character is entered, what is the expected time to discover the correct password?

2105






Give some examples of use of thread in a single user multiprocessing system

5154


Can you just explain about memory management in iOS?

2


Directories can be implemented either as "special files" that can only be accessed in limited ways, or as ordinary data files. What are the advantages and disadvantages of each approach?

3021


What is the difference between the OS which you use and other OSs?

5


wha is very first process created by kernel

3


What are Odm Commands.

5


what kind of operating(s)systems would be needed (and explain why) in an environment where there exist various cluster of networks which are all interconnected in different geographical areas with strong emphasis on online applicating process.

1083


What is a Safe State and what is its use in deadlock avoidance?

2


What Command To Take Backup Other Vg's?

4


what is ms configure?

1194