CoolInterview.com - World's Largest Collection of Interview Questions & Answers, FAQs, queries, sample papers, exam papers, dumps, what, why, how, where, when questions
Our Services
Get 9,000 Interview Questions & Answers in an eBook.




Get it now !!
Send your Resume to 6000 Companies
Windows Programing Interview Questions & Answers - Learning Mode
COOLINTERVIEW.COM PROGRAMMING LANGUAGES INTERVIEW QUESTIONS WINDOWS PROGRAMING INTERVIEW QUESTIONS QUESTIONS & ANSWERS - LEARNING MODE

Windows Programing Interview Questions & Answers - Learning Mode

The Windows API, informally WinAPI, is Microsoft's core set of application programming interfaces (APIs) available in the Microsoft Windows operating systems. Most of the programming in Microsoft Windows is based on the Win32 library. To support modern requirements of computer applications, Microsoft created the .NET Framework that provides most of the functionality you will need for your application. Like any regular graphical library, the .NET Framework provides classes that can be used to create graphical objects.

Try Windows Programing Interview Questions & Answers - Exam Mode

1 2 3 4 5 6 Next

Sort By : Latest First | Oldest First | By Rating

Windows Programing Interview Questions & Answers - Learning Mode
Try Windows Programing Interview Questions & Answers - Exam Mode
Question: Why are page sizes always powers of 2?

Answer: Recall that paging is implemented by breaking up an address into a page and offset number. It is most efficient to break the address into X page bits and Y offset bits, rather than perform arithmetic on the address to calculate the page number and offset. Because each bit position represents a power of 2, splitting an address between bits results in a page size that is a power of 2. Source: CoolInterview.com
Question: What are Dynamic Loading, Dynamic Linking and Overlays?

Answer: Dynamic Loading:
► Routine is not loaded until it is called
► Better memory-space utilization; unused routine is never loaded.
► Useful when large amounts of code are needed to handle infrequently occurring cases.
► No special support from the operating system is required implemented through program design.
Dynamic Linking:
► Linking postponed until execution time.
► Small piece of code, stub, used to locate the appropriate memory-resident Source: CoolInterview.com
Question: What is the main component of operating system?

Answer: Main component of operating system are kernel and shell.

Shell is a interface between application program and kernel whenever application program wants some work to be done It contacts kernel and kernel inturn perform work with the help of device drivers .thus we can say kernel is an interface between hardware and shell.

Kernel uses device drivers to control microcontroller card of peripheral device and inturn work is being accomplished.

application program -> [shells -&g Source: CoolInterview.com
Question: How do you recover an object in Active Directory, which is accidentally deleted by you, with no backup?

Answer: Using ntdsutil.exe command,we can restored the AD objects. Source: CoolInterview.com
Question: Why paging is used?

Answer: Paging is solution to external fragmentation problem which is to permit the logical address space of a process to be noncontiguous, thus allowing a process to be allocating physical memory wherever the latter is available.
32 :: What is a Safe State and its use in deadlock avoidance? Source: CoolInterview.com
Question: On a system with paging, a process cannot access memory that it does not own why? How could the operating system allow access to other memory? Why should it or should it not?

Answer: An address on a paging system is a logical page number and an offset. The physical page is found by searching a table based on the logical page number to produce a physical page number. Because the operating system controls the contents of this table, it can limit a process to accessing only those physical pages allocated to the
process. There is no way for a process to refer to a page it does not own because the page will not be in the page table. To allow such access, an operating system si Source: CoolInterview.com
Question: Explain Segmentation with paging?

Answer: Segments can be of different lengths, so it is harder to find a place for a segment in memory than a page. With segmented virtual memory, we get the benefits of virtual memory but we still have to do dynamic storage allocation of physical memory. In order to avoid this, it is possible to combine segmentation and paging into a two-level
virtual memory system. Each segment descriptor points to page table for that segment.This give some of the advantages of paging (easy placement) with some of t Source: CoolInterview.com
Question: What is the important aspect of a real-time system or Mission Critical Systems?

Answer: A real time operating system has well defined fixed time constraints. Process must be done within the defined constraints or the system will fail. An example is the operating system for a flight control computer or an advanced jet airplane. Often used as a control device in a dedicated application such as controlling scientific experiments, medical imaging systems, industrial control systems, and some display systems.Real-Time systems may be either hard or soft real-time.

Hard real-time:< Source: CoolInterview.com
Question: What is Mutex Object and why it is used?

Answer: A mutex object is a synchronization object whose state is set to signaled when it is not owned by any thread, and non-signaled when it is owned. For example, to prevent two threads from writing to shared memory at the same time, each thread waits for ownership of a mutex object before executing the code that accesses the memory. After writing to the shared memory, the thread releases the mutex object. Source: CoolInterview.com
Question: Differentiate between Compiler and Interpreter?

Answer: An interpreter reads one instruction at a time and carries out the actions implied by that instruction. It does not perform any translation. But a compiler translates the entire instructions. Source: CoolInterview.com
Question: Condition for deadlock occurrence?

Answer: Deadlock can arise if four conditions hold simultaneously.

Mutual exclusion:
only one process at a time can use a resource.

Hold and wait:
a process holding at least one resource is waiting to acquire additional resources held by other processes.

No preemption:
a resource can be released only voluntarily by the process holding it, after that process has completed its task.

Circular wait:
there exists a set {P0, P1, ?, P0} of waiting processes such that P0 Source: CoolInterview.com
Question: Why thread is called as a lightweight process?

Answer: It is called light weight process to emphasize the fact that a thread is like a process but is more efficient and uses fewer resources( n hence "lighter")and they also share the address space. Source: CoolInterview.com
Question: What is Dispatcher?

Answer: Dispatcher module gives control of the CPU to the process selected by the short-term scheduler; this involves:
Switching context
Switching to user mode
Jumping to the proper location in the user program to restart that program
Dispatch latency ? time it takes for the dispatcher to stop one process and start another running. Source: CoolInterview.com
Question: Which is the data member common to all the kernel object and what is the use of it?

Answer: The usage count is one of the data members common to all kernel object types Source: CoolInterview.com
Question: Compare Linux credit based algorithm with other scheduling algorithms?

Answer: For the conventional time ?shared processes, Linux uses a prioritized, credit-based algorithm. Each process possesses a certain number of scheduling credits; when a new task must be chosen to run, the process with most credits is selected. Every time that a timer interrupt occurs, the currently running process loses one credit; when its credits reaches zero, it is suspended and another process is chosen. If no runnable processes have any credits, then Linux performs a recrediting operation, addi Source: CoolInterview.com
Question: What is CPU Scheduler?

Answer: ► Selects from among the processes in memory that are ready to execute, and allocates the CPU to one of them.
► CPU scheduling decisions may take place when a process:
1.Switches from running to waiting state.
2.Switches from running to ready state.
3.Switches from waiting to ready.
4.Terminates.
► Scheduling under 1 and 4 is nonpreemptive.
► All other scheduling is preemptive. Source: CoolInterview.com
Question: What is the difference between unix and windows?

Answer: Unix and Windows use completely different paradigms for run-time loading of code. Before you try to build a module that can be dynamically loaded, be aware of how your system works.

In Unix, a shared object (.so) file contains code to be used by the program, and also the names of functions and data that it expects to find in the program. When the file is joined to the program, all references to those functions and data in the file's code are changed to point to the actual locations in Source: CoolInterview.com
Question: What are the main difference between Micro-Controller and Micro- Processor?

Answer: A microcontroller is by definition a is a computer on a chip. It includes all the necessary parts (including the memory) all in one IC. You just need to apply the power (and possibly clock signal) to that device and it starts executing the program programmed to it. A microcontroller generally has the main CPU core, ROM/EPROM/EEPROM/FLASH, RAM and some necessary functions (like timers and I/O controllers) all integrated into one chip. The original idea behind the
microcontroller was to limit t Source: CoolInterview.com
Question: What is the need of process relative handles?

Answer: The most important reason was robustness. If kernel object handles were system-wide values, one process could easily obtain the handle to an object that another process was using and wreak havoc on that process. Another reason for process-relative handles is security. Kernel objects are protected with security, and a process must request permission to manipulate an object before attempting to manipulate it. The creator of the object can prevent an unauthorized user from touching the object simpl Source: CoolInterview.com
Question: What is handle?

Answer: Handle value is actually the index into the process?s handle table that identifies where the kernel object?s information is stored. Source: CoolInterview.com

1 2 3 4 5 6 Next



India News Network
Latest 20 Questions
Payment of time- barred debt is: (a) Valid (b) Void (c) Illegal (d) Voidable
Consideration is defined in the Indian Contract Act,1872 in: (a) Section 2(f) (b) Section 2(e) (c) Section 2(g) (d) Section 2(d)
Which of the following is not an exception to the rule, "No consideration, No contract": (a) Natural love and affection (b) Compensation for involuntary services (c) Completed gift (d) Agency
Consideration must move at the desire of: (a) The promisor (b) The promisee (c) The promisor or any other party (d) Both the promisor and the promisee
An offer which is open for acceptance over a period of time is: (a) Cross Offer (b) Counter Offer (c) Standing Offer (d) Implied Offer
Specific offer can be communicated to__________ (a) All the parties of contract (b) General public in universe (c) Specific person (d) None of the above
_________ amounts to rejection of the original offer. (a) Cross offer (b) Special offer (c) Standing offer (d) Counter offer
A advertises to sell his old car by advertising in a newspaper. This offer is caleed: (a) General Offer (b) Special Offer (c) Continuing Offer (d) None of the above
In case a counter offer is made, the original offer stands: (a) Rejected (b) Accepted automatically (c) Accepted subject to certain modifications and variations (d) None of the above
In case of unenforceable contract having some technical defect, parties (a) Can sue upon it (b) Cannot sue upon it (c) Should consider it to be illegal (d) None of the above
If entire specified goods is perished before entering into contract of sale, the contract is (a) Valid (b) Void (c) Voidable (d) Cancelled
______________ contracts are also caled contracts with executed consideration. (a) Unilateral (b) Completed (c) Bilateral (d) Executory
A offers B to supply books @ Rs 100 each but B accepts the same with condition of 10% discount. This is a case of (a) Counter Offer (b) Cross Offer (c) Specific Offer (d) General Offer
_____________ is a game of chance. (a) Conditional Contract (b) Contingent Contract (c) Wagering Contract (d) Quasi Contract
There is no binding contract in case of _______ as one's offer cannot be constructed as acceptance (a) Cross Offer (b) Standing Offer (c) Counter Offer (d) Special Offer
An offer is made with an intention to have negotiation from other party. This type of offer is: (a) Invitation to offer (b) Valid offer (c) Voidable (d) None of the above
When an offer is made to the world at large, it is ____________ offer. (a) Counter (b) Special (c) General (d) None of the above
Implied contract even if not in writing or express words is perfectly _______________ if all the conditions are satisfied:- (a) Void (b) Voidable (c) Valid (d) Illegal
A specific offer can be accepted by ___________. (a) Any person (b) Any friend to offeror (c) The person to whom it is made (d) Any friend of offeree
An agreement toput a fire on a person's car is a ______: (a) Legal (b) Voidable (c) Valid (d) Illegal
Cache = 0.330078 Seconds