Operating Systems AllOther Interview Questions
Questions Answers Views Company eMail

Method used for Disk searching.. a.linked list b.AVL c.B-tree d. binary tree

Hughes, KKR,

3 7546

which one of following is not memory management model? choices are buddy system, monitors, paging, swapping

Satyam, Hughes,

6 7392

One solution for deadlock prevention for dining philosopher's problem


3 6897

Which of following is used for back-up files? (a) compress (b) Tar (c) make (d) all the above


1 3347

In the process table entry for the kernel process, the process id value is a) 0 b) 1 c) 2 d) 255 e) it does not have a process table entry

IBM, Aspire, Saigun Technologies,

4 12053

One Gigabyte =?( 2 power30 , 2 power 20 ,2 power 10 none)


4 7967

DMA - abbrevation (Direct Memory Access,Discrete memory Access,Disk memoryaccess)


4 4157

How does the scheduler know the time how it should be scheduled.


1 5911

What is deadlock? How do you avoid it?

Motorola, HCL,

9 47004

What is a semaphore?

TCS, Persistent, Motorola,

20 41067

Virtual memory size depends on [a] address lines [b] data bus [c] disc space [d] a & c [e] none

Wipro, Satyam, Infosys, TCS, SafeNet, VIT Infotech,

15 23885

what are Prerequisites to Install Active Directory in windows 2000 server?


3 4032

Which is your favorite editor, shell, programming shell and why?



What operating systems provide threads?

5 4034

What is TSY?

CMC, TATA, Samsung,

4 6523

Post New Operating Systems AllOther Questions

Un-Answered Questions { Operating Systems AllOther }

what is gr-edge edit?


What Command To Restore Backup Of Non - Rootvg?


What are compile time Errors?


what kind of operating(s)systems would be needed (and explain why) in an environment where there exist various cluster of networks which are all interconnected in different geographical areas with strong emphasis on online applicating process.


What do you know about the latest android version Lollipop?


How many bytes we can send to apple push notification server in iOS operating system?


Dear All, When the patches are installed in the server OS, how will we know that which patch is the latest patch?


How To Enable & Disable Quorum?


Assuming one link of the Trojan horse copy-and-observe-later chain is broken. There are two other possible angles of attack by Alice: Alice logging on and attempting to read the string directly, and alice assigning a security level of sensitive to the back-pocket file. Does the reference monitor prevent these attacks?


Explain the term shell.


What Command To Take Backup Other Vg's?


Assuming feedback to the adversary flugging an error as each incorrect character is entered, what is the expected time to discover the correct password?


What is Cycle Stealing in OS?


i want information about real time operating systems because i have an interview tomoorow in valeo company.


What is the difference between the OS which you use and other OSs?