Technical Question Bank Operating Systems
Technical Question Bank Operating Systems
Systems
• Explain the concept of Reentrancy?
A reentrant procedure can be interrupted and called by an interrupting program, and
still execute correctly on returning to the procedure.
• What is thrashing?
Thrashing occurs in computer systems when there's excessive and inefficient swapping of
data between RAM and the disk, resulting in high page fault rates, low CPU utilization for
useful tasks, and poor system responsiveness. It is typically caused by insufficient physical
memory to accommodate the demands of running processes. Mitigation strategies include
adding more RAM, optimizing page replacement algorithms, and managing the number
of concurrent processes.
• Mention the Coffman's conditions that lead to a deadlock.
Coffman's conditions for deadlock are:
1. Mutual Exclusion: Resources cannot be shared; only one process can use a resource at a
time.
2. Hold and Wait: Processes hold resources while waiting for others, creating potential
circular waiting.
3. No Preemption: Resources cannot be forcibly taken from a process; they must be
explicitly released.
4. Circular Wait: A circular chain of processes exists, with each waiting for a resource
held by another in the chain.
- Long-term Scheduling (Job Scheduling): Selects processes from the job pool and brings
them into the system, aiming for overall system efficiency and a balanced mix of
processes.
3. System Accountability:
- System must be able to audit security-relevant events.
- Logs should be protected against tampering.
4. Resource Isolation:
- Processes and data should be protected from unauthorized access.
5. Trusted Recovery:
- The system should be able to recover to a known secure state after a security breach.
6. Security Testing:
- System design and implementation must undergo security testing.
- Trapdoor: A trapdoor is a hidden entry point into a software system that allows
unauthorized access. In security contexts, it refers to a deliberate vulnerability or
backdoor that can be exploited for unauthorized entry.
- Global Page Replacement: Involves selecting a page for replacement from the entire pool
of pages in the system, regardless of the process to which it belongs. Replacement
decisions consider the overall system's page usage and may impact multiple processes.
• Define latency, transfer, and seek time with respect to disk I/O
- Latency Time: Time for disk rotation and head positioning.
- Transfer Time: Time to read or write data once positioned.
- Seek Time: Time for the read/write head to move to the desired track.
• How do the wait/signal operations for monitor differ from those for semaphores?
Monitors:
- Wait Operation: Releases lock and waits for a condition.
- Signal Operation: Signals one waiting thread to continue.
Semaphores:
- Wait Operation (P): Decrements count, may block.
- Signal Operation (V): Increments count, wakes up a blocked process if needed.
• In the context of memory management, what are placement and replacement algorithms?
Placement Algorithms:
- Objective: Optimize initial allocation.
- Examples: First Fit, Best Fit.
Replacement Algorithms:
- Objective: Minimize impact during removal.
- Examples: LRU, FIFO.
• In loading programs into memory, what is the difference between load-time dynamic linking
and runtime dynamic linking?
Load-Time Dynamic Linking:
- Occurs during program loading.
- Linking in advance.
- Faster startup.
Pre-Paging:
- Anticipates future page accesses.
- Proactively loads pages ahead of time to reduce potential page faults.
• What is SMP?
SMP stands for Symmetric Multiprocessing. It is a computer architecture design that
involves multiple processors or cores, each having equal access to the system's memory
and I/O resources. In an SMP system, all processors share a common, single operating
system and memory space, allowing them to execute tasks concurrently and work on
different parts of a program or multiple programs simultaneously. SMP systems are
known for their scalability and the ability to efficiently handle multitasking and parallel
processing workloads.
• What is mutant?
In computing, a "mutant" is a modified version of an individual or solution in genetic
algorithms, introduced to explore new possibilities and enhance the evolutionary search
process.
• What is FtDisk?
"FtDisk" refers to the Fault Tolerant Disk Driver in Windows operating systems. It
manages fault-tolerant disk configurations like RAID 1 and RAID 5, ensuring data
integrity and availability in the event of disk failures.
2. Ring 1:
- Not used in Windows NT.
- Originally intended for separate execution environments but not implemented in Windows
NT.
3. Ring 2:
- Not used in Windows NT.
- Reserved for future use but remains unused in the Windows NT architecture.
Together, they manage I/O operations, provide interfaces to devices and drivers, handle
errors, support Plug and Play, and optimize power usage.
• What are DDks? Name an operating system that includes this feature.
DDK stands for Device Driver Kit. It is a set of tools and resources provided by operating
system vendors to assist developers in creating device drivers. An example is the Windows
Driver Kit (WDK) for Windows operating systems.
1. Internal Fragmentation:
- Wasted space within allocated memory blocks.
2. External Fragmentation:
- Free memory scattered in small fragments, hindering allocation of contiguous memory.
3. Disk Fragmentation:
- Non-contiguous storage of file data on disks, affecting access times.
1. User Interface:
- XP: Visually appealing, redesigned interface.
- 2000: Business-oriented, less visually polished.
2. Editions:
- XP: Home and Professional editions.
- 2000: Professional, Server, and Advanced Server editions.
3. System Requirements:
- XP: Higher system specs, suitable for newer hardware.
- 2000: Broad hardware compatibility, including older systems.
4. Stability and Performance:
- XP: Stable with improved performance.
- 2000: Known for stability, especially in server environments.
5. Compatibility:
- XP: Enhanced hardware and software compatibility.
- 2000: Broad compatibility, but may have limitations compared to XP.
6. Release Dates:
- XP: Released in 2001.
- 2000: Released in 2000.
• What is arm-stickiness?
In the context of computer systems, "arm-stickiness" does not refer to a well-known or
standardized term. It's possible that the term may be used in a specific context or within a
particular domain. Without additional context or information, it's challenging to provide
a precise definition for "arm-stickiness."
If the term is used in a specific field, industry, or technology, please provide more details
or clarify the context so that I can offer a more accurate explanation.
• In the context of memory management, what are replacement and placement algorithms?
Replacement Algorithms:
- Decide which page to replace when bringing in new data.
- Examples: LRU, FIFO, Optimal.
Placement Algorithms:
- Determine where to allocate new data or processes in memory.
- Examples: First Fit, Best Fit, Worst Fit.
2. Page Tables:
3. Page Size:
6. Protection Mechanisms:
7. Dirty Bit:
8. Demand Paging: