Operating Systems Senior

1 / 10

Explain the concept of thrashing in virtual memory systems.

Select the correct answer

1

Thrashing is a protocol used for secure data transmission.

2

Thrashing is a method for backing up data to an external storage device.

3

Thrashing is a technique used to optimize the execution speed of a program.

4

Thrashing occurs when a system spends more time swapping pages in and out of memory than executing applications, leading to severe performance degradation.

What is the role of the SIGKILL signal in Unix-like operating systems, and how does it differ from SIGTERM?

Select the correct answer

1

The SIGKILL signal forcefully terminates a process and cannot be caught or ignored, while SIGTERM requests a graceful termination.

2

The SIGKILL signal restarts a process, while SIGTERM pauses it.

3

The SIGKILL signal is used for debugging, while SIGTERM is used for normal process execution.

4

The SIGKILL signal sends data between processes, while SIGTERM encrypts it.

What is RAID?

Select the correct answer

1

RAID is a type of software used for encrypting data.

2

RAID is a method of compressing files to save disk space.

3

RAID (Redundant Array of Independent Disks) is a storage technology that combines multiple disk drives to improve performance and fault tolerance.

4

RAID is a protocol for network communication between computers.

Explain the concept of a memory leak in software development.

Select the correct answer

1

A memory leak is a protocol for transferring large files over a network.

2

A memory leak is a method of compressing data to save disk space.

3

A memory leak is a process that runs in the background to monitor system performance.

4

A memory leak occurs when a program fails to release memory that is no longer needed, leading to gradual memory exhaustion.

What is the role of the chroot command in Unix-like operating systems?

Select the correct answer

1

The chroot command encrypts files to protect them from unauthorized access.

2

The chroot command schedules tasks to run at specified intervals.

3

The chroot command is used to copy files from one directory to another.

4

The chroot command changes the root directory for the current process and its children, creating an isolated environment.

What is a memory-mapped file?

Select the correct answer

1

A memory-mapped file allows file I/O to be treated as normal memory access, improving performance for large file operations.

2

A memory-mapped file is a type of file that stores backup data.

3

A memory-mapped file is a protocol used for secure data transmission.

4

A memory-mapped file is a method for encrypting files to protect against unauthorized access.

Explain the concept of dynamic linking in the context of shared libraries.

Select the correct answer

1

Dynamic linking is a technique used for compressing large files.

2

Dynamic linking is a process of transferring data between different applications.

3

Dynamic linking allows programs to share common code libraries at runtime, reducing memory usage and disk space.

4

Dynamic linking is a method of encrypting data to enhance security.

What is the purpose of an interrupt vector table in the context of operating systems?

Select the correct answer

1

The interrupt vector table is a protocol used for secure data transmission.

2

The interrupt vector table manages memory allocation for applications.

3

The interrupt vector table is a list of processes currently running in the system.

4

The interrupt vector table stores the addresses of interrupt handlers, enabling the CPU to quickly locate and execute them.

What is process migration?

Select the correct answer

1

Process migration is a technique for compressing data to save memory.

2

Process migration is a method for backing up data to an external storage device.

3

Process migration is the act of converting a process from one programming language to another.

4

Process migration involves moving a process from one system to another for load balancing or fault tolerance.

What is a daemon process in Unix-like operating systems?

Select the correct answer

1

A daemon process runs in the background and performs system-related tasks without direct user interaction.

2

A daemon process is a graphical interface used to manage system resources.

3

A daemon process is a protocol for transferring data between computers.

4

A daemon process is a type of user application used for file management.