Operating Systems AllOther Interview Questions
Questions Answers Views Company eMail

Method used for Disk searching.. a.linked list b.AVL c.B-tree d. binary tree

Hughes, KKR,

3 7278

which one of following is not memory management model? choices are buddy system, monitors, paging, swapping

Hughes, Satyam,

6 6996

One solution for deadlock prevention for dining philosopher's problem


3 6661

Which of following is used for back-up files? (a) compress (b) Tar (c) make (d) all the above


1 3134

In the process table entry for the kernel process, the process id value is a) 0 b) 1 c) 2 d) 255 e) it does not have a process table entry

Aspire, IBM, Saigun Technologies,

4 11287

One Gigabyte =?( 2 power30 , 2 power 20 ,2 power 10 none)


4 7585

DMA - abbrevation (Direct Memory Access,Discrete memory Access,Disk memoryaccess)


4 3920

How does the scheduler know the time how it should be scheduled.


1 5604

What is deadlock? How do you avoid it?


9 45854

What is a semaphore?

Motorola, Persistent, TCS,

20 40030

Virtual memory size depends on [a] address lines [b] data bus [c] disc space [d] a & c [e] none

Infosys, Satyam, TCS, Wipro, SafeNet, VIT Infotech,

15 22931

what are Prerequisites to Install Active Directory in windows 2000 server?


3 3844

Which is your favorite editor, shell, programming shell and why?



What operating systems provide threads?

5 3825

What is TSY?

CMC, Samsung, TATA,

4 6189

Post New Operating Systems AllOther Questions

Un-Answered Questions { Operating Systems AllOther }

What is the meaning of slosh login in nfs?


why we make plex offline online in vxvm?


Give some examples of use of thread in a single user multiprocessing system


Some operating system have a tree structured file system but limits the depth of the tree to some small number of levels. what effect does this limit have on users? How does this simplify file system (if it does)?


i want information about real time operating systems because i have an interview tomoorow in valeo company.


what is gr-edge edit?


Directories can be implemented either as "special files" that can only be accessed in limited ways, or as ordinary data files. What are the advantages and disadvantages of each approach?


any body tell me what are the prob's mostly we face and send some critical prob in real time environment in Solaris and veritas (VXVM,VCS)


In the token-passing mutual exclusion algorithm, is the timestamping used to reset clocks and correct drifts, as in the distributed queue algorithms? if not, what is the function of the timestamping?


Assuming one link of the Trojan horse copy-and-observe-later chain is broken. There are two other possible angles of attack by Alice: Alice logging on and attempting to read the string directly, and alice assigning a security level of sensitive to the back-pocket file. Does the reference monitor prevent these attacks?


Dear All, When the patches are installed in the server OS, how will we know that which patch is the latest patch?


describe the situation in which priority inversion can occur


what is ms configure?


The flushing policy is described in the subsection on process migration strategies: a) From the perspective of the source, which other strategy does flushing resembles? b) From the perspective of the target, which other strategy does flushing resemble?


1) What is an Virtual memory? 2) How do we test API's in both Windows/Linux/Unix? 3) What is an IOCTL? 4) How do you open a char device through API's? 5) What is major num/ minor num? 6) What is the max num for minor num? 7) Who gives you the major / minor numbers? 8) Reverse a string using recursive func. 9) fork/vfork/clone. 10) What does fork returns? 11) What is a zombie process? 12) What happens when a child completes before parent tries to wait for it? 13) Interrupt handlers, top-hdnl....?