|
Question |
Rating |
View Answer |
|
What do we do when the operating is crashed?How do we install another operating system? |
|
View Answer |
|
What are the requirements for virtual memory architecture? |
|
View Answer |
|
Explain the concept of Reentrancy. |
|
View Answer |
|
Explain Belady's Anomaly. |
|
View Answer |
|
What is a binary semaphore? What is its use? |
|
View Answer |
|
What is thrashing? |
|
View Answer |
|
List the Coffman's conditions that lead to a deadlock. |
|
View Answer |
|
What are short-, long- and medium-term scheduling? |
|
View Answer |
|
What are turnaround time and response time? |
|
View Answer |
|
What are the typical elements of a process image? |
|
View Answer |
|
What is the Translation Lookaside Buffer (TLB)? |
|
View Answer |
|
What is the resident set and working set of a process? |
|
View Answer |
|
When is a system in safe state? |
|
View Answer |
|
What is cycle stealing? |
|
View Answer |
|
What is meant by arm-stickiness? |
|
View Answer |
|
What are the stipulations of C2 level security? |
|
View Answer |
|
What is busy waiting? |
|
View Answer |
|
Explain the popular multiprocessor thread-scheduling strategies |
|
View Answer |
|
When does the condition 'rendezvous' arise? |
|
View Answer |
|
What is a trap and trapdoor? |
|
View Answer |