Operating Systems AllOther Interview Questions
Questions Answers Views Company eMail

Method used for Disk searching.. a.linked list b.AVL c.B-tree d. binary tree

Hughes, KKR,

3 7278

which one of following is not memory management model? choices are buddy system, monitors, paging, swapping

Hughes, Satyam,

6 6996

One solution for deadlock prevention for dining philosopher's problem

Hughes,

3 6661




Which of following is used for back-up files? (a) compress (b) Tar (c) make (d) all the above

Cadence,

1 3134

In the process table entry for the kernel process, the process id value is a) 0 b) 1 c) 2 d) 255 e) it does not have a process table entry

Aspire, IBM, Saigun Technologies,

4 11287

One Gigabyte =?( 2 power30 , 2 power 20 ,2 power 10 none)

Mascot,

4 7585

DMA - abbrevation (Direct Memory Access,Discrete memory Access,Disk memoryaccess)

Mascot,

4 3920

How does the scheduler know the time how it should be scheduled.

Motorola,

1 5604




What is deadlock? How do you avoid it?

Motorola,

9 45854

What is a semaphore?

Motorola, Persistent, TCS,

20 40030

Virtual memory size depends on [a] address lines [b] data bus [c] disc space [d] a & c [e] none

Infosys, Satyam, TCS, Wipro, SafeNet, VIT Infotech,

15 22931

what are Prerequisites to Install Active Directory in windows 2000 server?

ISL,

3 3844

Which is your favorite editor, shell, programming shell and why?

TCS,

1392

What operating systems provide threads?

5 3825

What is TSY?

CMC, Samsung, TATA,

4 6189


Post New Operating Systems AllOther Questions






Un-Answered Questions { Operating Systems AllOther }

What is the meaning of slosh login in nfs?

1459


why we make plex offline online in vxvm?

1722


Give some examples of use of thread in a single user multiprocessing system

4962


Some operating system have a tree structured file system but limits the depth of the tree to some small number of levels. what effect does this limit have on users? How does this simplify file system (if it does)?

3513


i want information about real time operating systems because i have an interview tomoorow in valeo company.

2036






what is gr-edge edit?

1045


Directories can be implemented either as "special files" that can only be accessed in limited ways, or as ordinary data files. What are the advantages and disadvantages of each approach?

2945


any body tell me what are the prob's mostly we face and send some critical prob in real time environment in Solaris and veritas (VXVM,VCS)

1154


In the token-passing mutual exclusion algorithm, is the timestamping used to reset clocks and correct drifts, as in the distributed queue algorithms? if not, what is the function of the timestamping?

1622


Assuming one link of the Trojan horse copy-and-observe-later chain is broken. There are two other possible angles of attack by Alice: Alice logging on and attempting to read the string directly, and alice assigning a security level of sensitive to the back-pocket file. Does the reference monitor prevent these attacks?

1756


Dear All, When the patches are installed in the server OS, how will we know that which patch is the latest patch?

1159


describe the situation in which priority inversion can occur

239


what is ms configure?

1148


The flushing policy is described in the subsection on process migration strategies: a) From the perspective of the source, which other strategy does flushing resembles? b) From the perspective of the target, which other strategy does flushing resemble?

1172


1) What is an Virtual memory? 2) How do we test API's in both Windows/Linux/Unix? 3) What is an IOCTL? 4) How do you open a char device through API's? 5) What is major num/ minor num? 6) What is the max num for minor num? 7) Who gives you the major / minor numbers? 8) Reverse a string using recursive func. 9) fork/vfork/clone. 10) What does fork returns? 11) What is a zombie process? 12) What happens when a child completes before parent tries to wait for it? 13) Interrupt handlers, top-hdnl....?

1302