Operating Systems AllOther Interview Questions
Questions Answers Views Company eMail

give the exact definition of operating system is it necessary to load OS in every system to run any program if so, why?

1 3547

MY system is showing "BOOT FAILURE:SYSTEM HALTED" after restarting the system please give me the solution for this problem thanking you...........

ITC Infotech,

3 6890

what kind of operating(s)systems would be needed (and explain why) in an environment where there exist various cluster of networks which are all interconnected in different geographical areas with strong emphasis on online applicating process.

1850

Can I install the Operating System in USB Poratable Drive in 250 or 120GB?

IBM,

6 7647

Q1. What is an interrupt? How are multiple interrupts dealt with? Q2. Explain the difference between a MONOLITHIC KERNAL and a MICROKERNAL? Q3. List reasons why a Mode switch between threads may be cheaper than a Mode switch between processes. Q4. What is the difference among deadlock avoidance, detection and prevention? Q5. What items of information about a task might be useful in real time scheduling? Q6. Discuss some of the reasons for implementing process migration ? How is the process address space handled during process migration?

1 7519

Assume that passwords are selected from four-character combinations of 26 alphabetic characters. Assume that an adversary is able to attempt passwords at a rate of one per second. a) Assuming no feedback to the adversary until each attempt has been completed, what is the expected time to discover the correct password?

FCI,

4 18433

Assuming feedback to the adversary flugging an error as each incorrect character is entered, what is the expected time to discover the correct password?

3064

Assuming one link of the Trojan horse copy-and-observe-later chain is broken. There are two other possible angles of attack by Alice: Alice logging on and attempting to read the string directly, and alice assigning a security level of sensitive to the back-pocket file. Does the reference monitor prevent these attacks?

2555

The flushing policy is described in the subsection on process migration strategies: a) From the perspective of the source, which other strategy does flushing resembles? b) From the perspective of the target, which other strategy does flushing resemble?

1997

Directories can be implemented either as "special files" that can only be accessed in limited ways, or as ordinary data files. What are the advantages and disadvantages of each approach?

4189

Some operating system have a tree structured file system but limits the depth of the tree to some small number of levels. what effect does this limit have on users? How does this simplify file system (if it does)?

1 8379

In the token-passing mutual exclusion algorithm, is the timestamping used to reset clocks and correct drifts, as in the distributed queue algorithms? if not, what is the function of the timestamping?

HCL,

2452

how does virtual memory work?

1 5739

iam free downloading the KK Dictionery to my system but that is not installed yet. can anybody tell be why this happen and what the system have to install the software.

2068

DEFINE YOURSELF AT THE TIME OF INTERVIEW IN TELECOM SECTOR?

Airtel,

2 6295


Post New Operating Systems AllOther Questions

Un-Answered Questions { Operating Systems AllOther }

Is google an operating system?

686


Why is android better than ios?

722


What Command To Take Backup Other Vg's?

785


How can I increase storage on my laptop?

692


How much memory do I need on my laptop?

729






Is kernel a os?

684


Directories can be implemented either as "special files" that can only be accessed in limited ways, or as ordinary data files. What are the advantages and disadvantages of each approach?

4189


Do simultaneous downloads take longer?

703


What is the most powerful computer in the world 2019?

726


Is the g in gnu silent?

697


what are latest technologies ? and how will keep yourself up to date ?

2607


what is ms configure?

1907


In the token-passing mutual exclusion algorithm, is the timestamping used to reset clocks and correct drifts, as in the distributed queue algorithms? if not, what is the function of the timestamping?

2452


How To Convert A Normal Vg To Big & Scalable Vg And Also Big To Scalable Vg?

770


Is the higher the ghz the better?

699