Operating Systems Senior
Explain the concept of thrashing in virtual memory systems.
Select the correct answer
Thrashing is a protocol used for secure data transmission.
Thrashing is a method for backing up data to an external storage device.
Thrashing is a technique used to optimize the execution speed of a program.
Thrashing occurs when a system spends more time swapping pages in and out of memory than executing applications, leading to severe performance degradation.
What is the role of the SIGKILL signal in Unix-like operating systems, and how does it differ from SIGTERM?
Select the correct answer
The SIGKILL signal forcefully terminates a process and cannot be caught or ignored, while SIGTERM requests a graceful termination.
The SIGKILL signal sends data between processes, while SIGTERM encrypts it.
The SIGKILL signal is used for debugging, while SIGTERM is used for normal process execution.
The SIGKILL signal restarts a process, while SIGTERM pauses it.
What is RAID?
Select the correct answer
RAID is a method of compressing files to save disk space.
RAID (Redundant Array of Independent Disks) is a storage technology that combines multiple disk drives to improve performance and fault tolerance.
RAID is a type of software used for encrypting data.
RAID is a protocol for network communication between computers.
Explain the concept of a memory leak in software development.
Select the correct answer
A memory leak is a method of compressing data to save disk space.
A memory leak occurs when a program fails to release memory that is no longer needed, leading to gradual memory exhaustion.
A memory leak is a process that runs in the background to monitor system performance.
A memory leak is a protocol for transferring large files over a network.
What is the role of the chroot command in Unix-like operating systems?
Select the correct answer
The chroot command changes the root directory for the current process and its children, creating an isolated environment.
The chroot command encrypts files to protect them from unauthorized access.
The chroot command is used to copy files from one directory to another.
The chroot command schedules tasks to run at specified intervals.
What is a memory-mapped file?
Select the correct answer
A memory-mapped file is a method for encrypting files to protect against unauthorized access.
A memory-mapped file allows file I/O to be treated as normal memory access, improving performance for large file operations.
A memory-mapped file is a type of file that stores backup data.
A memory-mapped file is a protocol used for secure data transmission.
Explain the concept of dynamic linking in the context of shared libraries.
Select the correct answer
Dynamic linking allows programs to share common code libraries at runtime, reducing memory usage and disk space.
Dynamic linking is a method of encrypting data to enhance security.
Dynamic linking is a technique used for compressing large files.
Dynamic linking is a process of transferring data between different applications.
What is the purpose of an interrupt vector table in the context of operating systems?
Select the correct answer
The interrupt vector table is a protocol used for secure data transmission.
The interrupt vector table manages memory allocation for applications.
The interrupt vector table is a list of processes currently running in the system.
The interrupt vector table stores the addresses of interrupt handlers, enabling the CPU to quickly locate and execute them.
What is process migration?
Select the correct answer
Process migration is the act of converting a process from one programming language to another.
Process migration is a technique for compressing data to save memory.
Process migration involves moving a process from one system to another for load balancing or fault tolerance.
Process migration is a method for backing up data to an external storage device.
What is a daemon process in Unix-like operating systems?
Select the correct answer
A daemon process runs in the background and performs system-related tasks without direct user interaction.
A daemon process is a graphical interface used to manage system resources.
A daemon process is a protocol for transferring data between computers.
A daemon process is a type of user application used for file management.