- World's Largest Collection of Interview Questions & Answers, FAQs, queries, sample papers, exam papers, dumps, what, why, how, where, when questions
Our Services
Get 9,000 Interview Questions & Answers in an eBook.

Get it now !!
Send your Resume to 6000 Companies
Windows Operating System Interview Questions & Answers - Learning Mode

Windows Operating System Interview Questions & Answers - Learning Mode

Microsoft Windows (or simply Windows) is a metafamily of graphical operating systems developed, marketed, and sold by Microsoft. It consists of several families of operating systems, each of which cater to a certain sector of the computing industry.

Try Windows Operating System Interview Questions & Answers - Exam Mode

1 2 3 4 5 6 Next

Sort By : Latest First | Oldest First | By Rating

Windows Operating System Interview Questions & Answers - Learning Mode
Try Windows Operating System Interview Questions & Answers - Exam Mode
Question: Why thread is called as a lightweight process?

Answer: It is called light weight process to emphasize the fact that a thread is like a process but is more efficient and uses fewer resources( n hence "lighter")and they also share the address space.
Question: Explain briefly about, processor, assembler, compiler, loader, linker and the functions executed by them.

Answer: Processor:--A processor is the part a computer system that executes instructions .It is also called a CPU
Assembler: -- An assembler is a program that takes basic computer instructions and converts them into a pattern of bits that the computer's processor can use to perform its basic operations. Some people call these instructions assembler language and others use the term assembly language.
Compiler: --- A compiler is a special program that processes statements written in a particular Source:
Question: Common Functions of Interrupts?

Answer: ->Interrupt transfers control to the interrupt service routine generally, through the interrupt vector, which contains the addresses of all the service routines.
->Interrupt architecture must save the address of the interrupted instruction.
->Incoming interrupts are disabled while another interrupt is being processed to prevent a lost interrupt.
->A trap is a software-generated interrupt caused either by an error or a user request.
->An operating system is interrupt dr Source:
Question: Describe the actions taken by thread library to context switch between user level threads?

Answer: The thread library function performs the following actions to context switch between user level threads Copy all live registers to Thread control Block (TCB) Restore the state of the thread to run next i.e (copy the values of live registers from (TCB) to registers) Move to the next thread to execute Source:
Question: What is a Safe State and its? use in deadlock avoidance?

Answer: When a process requests an available resource, system must decide if immediate allocation leaves the system in a safe state
->System is in safe state if there exists a safe sequence of all processes.
->Sequence <P1, P2? Pn> is safe if for each Pi, the resources that Pi can still request can be satisfied by currently available resources + resources held by all the Pj, with j<I.
If Pi resource needs are not immediately available, then Pi can wait until all Pj have finished. Source:
Question: What is starvation and aging?

Answer: Starvation: Starvation is a resource management problem where a process does not get the resources it needs for a long time because the resources are being allocated to other processes.
Aging: Aging is a technique to avoid starvation in a scheduling system. It works by adding an aging factor to the priority of each request. The aging factor must increase the request?s priority as time passes and must ensure that a request will eventually be the highest priority request (after it has waited lo Source:
Question: Under what circumstances do page faults occur? Describe the actions taken by the operating system when a page fault occurs?

Answer: A page fault occurs when an access to a page that has not been brought into main memory takes place. The operating system verifies the memory access, aborting the program if it is invalid. If it is valid, a free frame is located and I/O is requested to read the needed page into the free frame. Upon completion of I/O, the process table and
page table are updated and the instruction is restarted. Source:
Question: Describe different job scheduling in operating systems.

Answer: Scheduling is the activity of the deciding when process will receive the resources they request.
FCFS: --- FCSFS stands for First Come First Served. In FCFS the job that has been waiting the longest is served next.
Round Robin Scheduling: ---Round Robin scheduling is a scheduling method where each process gets a small quantity of time to run and then it is preempted and the next process gets to run. This is called time-sharing and gives the effect of all the processes running at the same t Source:
Question: Why are page sizes always powers of 2?

Answer: Recall that paging is implemented by breaking up an address into a page and offset number. It is most efficient to break the address into X page bits and Y offset bits, rather than perform arithmetic on the address to calculate the page number and offset. Because each bit position represents a power of 2, splitting an address between bits
results in a page size that is a power of 2. Source:
Question: Define Demand Paging, Page fault interrupt, and Trashing?

Answer: Demand Paging: Demand paging is the paging policy that a page is not read into memory until it is requested, that is, until there is a page fault on the page.
Page fault interrupt: A page fault interrupt occurs when a memory reference is made to a page that is not in memory. The present bit in the page table entry will be found to be off by the virtual memory hardware and it will signal an interrupt.
Trashing: The problem of many page faults occurring in a short time, called ?page thrashin Source:
Question: Difference between Logical and Physical Address Space?

Answer: ->The concept of a logical address space that is bound to a separate physical address space is central to proper memory management.
Logical address ? generated by the CPU; also referred to as virtual address.
Physical address ? address seen by the memory unit.
->Logical and physical addresses are the same in compile-time and load-time address-binding schemes; logical (virtual) and physical addresses differ in execution-time address-binding scheme Source:
Question: What is the cause of thrashing? How does the system detect thrashing? Once it detects thrashing, what can the system do to eliminate this problem?

Answer: Thrashing is caused by under allocation of the minimum number of pages required by a process, forcing it to continuously page fault. The system can detect thrashing by evaluating the level of CPU utilization as compared to the level of multiprogramming. It can be eliminated by reducing the level of multiprogramming. Source:
Question: What are different tasks of Lexical Analysis?

Answer: The purpose of the lexical analyzer is to partition the input text, delivering a sequence of comments and basic symbols. Comments are character sequences to be ignored, while basic symbols are character sequences that correspond to terminal symbols of the grammar defining the phrase structure of the input Source:
Question: Condition for deadlock occurrence?

Answer: Deadlock can arise if four conditions hold simultaneously.
Mutual exclusion: only one process at a time can use a resource.
Hold and wait: a process holding at least one resource is waiting to acquire additional resources held by other processes.
No preemption: a resource can be released only voluntarily by the process holding it, after that process has completed its task.
Circular wait: there exists a set {P0, P1, ?, P0} of waiting processes such that P0 is waiting for a resource th Source:
Question: Compare Linux credit based algorithm with other scheduling algorithms?

Answer: For the conventional time ?shared processes, Linux uses a prioritized, credit-based algorithm. Each process possesses a certain number of scheduling credits; when a new task must be chosen to run, the process with most credits is selected. Every time that a timer interrupt occurs, the currently running process loses one credit; when its credits reaches zero, it is suspended and another process is chosen. If no runnable processes have any credits, then Linux performs a recrediting operation, addi Source:
Question: What is the difference between unix and windows?

Answer: Unix and Windows use completely different paradigms for run-time loading of code. Before you try to build a module that can be dynamically loaded, be aware of how your system works.

In Unix, a shared object (.so) file contains code to be used by the program, and also the names of functions and data that it expects to find in the program. When the file is joined to the program, all references to those functions and data in the file's code are changed to point to the actual locations i Source:
Question: Which file extension is responsible for holding address book in outlook express?

Answer: Outlook Express is a no-cost, basic e-mail program that is included with Microsoft Internet Explorer. Outlook Express stores contacts in a Microsoft Windows? Address Book file with an extension of .wab. The name of the file is based on your Windows logon name. For example, Lori Kane may have a Windows logon name of lorik, and her Windows Address Book file would be lorik.wab. This file is saved at C:Documents and Settings<user name>Application DataMicrosoftAddress Book. -Referene:Microsoft Source:
Question: Distributed Systems?

Answer: Distribute the computation among several physical processors.
Loosely coupled system ? each processor has its own local memory; processors communicate with one another through various communications lines, such as high-speed
buses or telephone lines
Advantages of distributed systems:
->Resources Sharing
->Computation speed up ? load sharing
->Communications Source:
Question: Describe and explain about values in Microsoft windows operating system?

Answer: At the bottom of the hierarchy are the entries, called values, which contain the information. Each value has three parts a name, a type, and the data. The name is just a Unicode string, often default if the directory contains only one value. The type is one of 11 standard types. The most common ones are Unicode string, a list of Unicode strings, a 32 bit integer, an arbitrary length binary number, and a symbolic link to a directory or entry elsewhere in the registry. Source:
Question: What is Throughput, Turnaround time, waiting time and Response time?

Answer: Throughput ? number of processes that complete their execution per time unit
Turnaround time ? amount of time to execute a particular process
Waiting time ? amount of time a process has been waiting in the ready queue
Response time ? amount of time it takes from when a request was submitted until the first response is produced, not output (for time-sharing environment) Source:

1 2 3 4 5 6 Next

India News Network
Latest 20 Questions
Payment of time- barred debt is: (a) Valid (b) Void (c) Illegal (d) Voidable
Consideration is defined in the Indian Contract Act,1872 in: (a) Section 2(f) (b) Section 2(e) (c) Section 2(g) (d) Section 2(d)
Which of the following is not an exception to the rule, "No consideration, No contract": (a) Natural love and affection (b) Compensation for involuntary services (c) Completed gift (d) Agency
Consideration must move at the desire of: (a) The promisor (b) The promisee (c) The promisor or any other party (d) Both the promisor and the promisee
An offer which is open for acceptance over a period of time is: (a) Cross Offer (b) Counter Offer (c) Standing Offer (d) Implied Offer
Specific offer can be communicated to__________ (a) All the parties of contract (b) General public in universe (c) Specific person (d) None of the above
_________ amounts to rejection of the original offer. (a) Cross offer (b) Special offer (c) Standing offer (d) Counter offer
A advertises to sell his old car by advertising in a newspaper. This offer is caleed: (a) General Offer (b) Special Offer (c) Continuing Offer (d) None of the above
In case a counter offer is made, the original offer stands: (a) Rejected (b) Accepted automatically (c) Accepted subject to certain modifications and variations (d) None of the above
In case of unenforceable contract having some technical defect, parties (a) Can sue upon it (b) Cannot sue upon it (c) Should consider it to be illegal (d) None of the above
If entire specified goods is perished before entering into contract of sale, the contract is (a) Valid (b) Void (c) Voidable (d) Cancelled
______________ contracts are also caled contracts with executed consideration. (a) Unilateral (b) Completed (c) Bilateral (d) Executory
A offers B to supply books @ Rs 100 each but B accepts the same with condition of 10% discount. This is a case of (a) Counter Offer (b) Cross Offer (c) Specific Offer (d) General Offer
_____________ is a game of chance. (a) Conditional Contract (b) Contingent Contract (c) Wagering Contract (d) Quasi Contract
There is no binding contract in case of _______ as one's offer cannot be constructed as acceptance (a) Cross Offer (b) Standing Offer (c) Counter Offer (d) Special Offer
An offer is made with an intention to have negotiation from other party. This type of offer is: (a) Invitation to offer (b) Valid offer (c) Voidable (d) None of the above
When an offer is made to the world at large, it is ____________ offer. (a) Counter (b) Special (c) General (d) None of the above
Implied contract even if not in writing or express words is perfectly _______________ if all the conditions are satisfied:- (a) Void (b) Voidable (c) Valid (d) Illegal
A specific offer can be accepted by ___________. (a) Any person (b) Any friend to offeror (c) The person to whom it is made (d) Any friend of offeree
An agreement toput a fire on a person's car is a ______: (a) Legal (b) Voidable (c) Valid (d) Illegal
Cache = 0.046875 Seconds