which one of following is not memory management model? choices are buddy system, monitors, paging, swapping6 6996
Which of following is used for back-up files? (a) compress (b) Tar (c) make (d) all the above1 3134
In the process table entry for the kernel process, the process id value is a) 0 b) 1 c) 2 d) 255 e) it does not have a process table entry4 11287
Virtual memory size depends on [a] address lines [b] data bus [c] disc space [d] a & c [e] none15 22931
Which is your favorite editor, shell, programming shell and why?
What operating systems provide threads?5 3825
What is the meaning of slosh login in nfs?
why we make plex offline online in vxvm?
Give some examples of use of thread in a single user multiprocessing system
Some operating system have a tree structured file system but limits the depth of the tree to some small number of levels. what effect does this limit have on users? How does this simplify file system (if it does)?
i want information about real time operating systems because i have an interview tomoorow in valeo company.
what is gr-edge edit?
Directories can be implemented either as "special files" that can only be accessed in limited ways, or as ordinary data files. What are the advantages and disadvantages of each approach?
any body tell me what are the prob's mostly we face and send some critical prob in real time environment in Solaris and veritas (VXVM,VCS)
In the token-passing mutual exclusion algorithm, is the timestamping used to reset clocks and correct drifts, as in the distributed queue algorithms? if not, what is the function of the timestamping?
Assuming one link of the Trojan horse copy-and-observe-later chain is broken. There are two other possible angles of attack by Alice: Alice logging on and attempting to read the string directly, and alice assigning a security level of sensitive to the back-pocket file. Does the reference monitor prevent these attacks?
Dear All, When the patches are installed in the server OS, how will we know that which patch is the latest patch?
describe the situation in which priority inversion can occur
what is ms configure?
The flushing policy is described in the subsection on process migration strategies: a) From the perspective of the source, which other strategy does flushing resembles? b) From the perspective of the target, which other strategy does flushing resemble?
1) What is an Virtual memory? 2) How do we test API's in both Windows/Linux/Unix? 3) What is an IOCTL? 4) How do you open a char device through API's? 5) What is major num/ minor num? 6) What is the max num for minor num? 7) Who gives you the major / minor numbers? 8) Reverse a string using recursive func. 9) fork/vfork/clone. 10) What does fork returns? 11) What is a zombie process? 12) What happens when a child completes before parent tries to wait for it? 13) Interrupt handlers, top-hdnl....?