Operating Systems Senior
Explain the concept of thrashing in virtual memory systems.
Select the correct answer
Thrashing occurs when a system spends more time swapping pages in and out of memory than executing applications, leading to severe performance degradation.
Thrashing is a technique used to optimize the execution speed of a program.
Thrashing is a protocol used for secure data transmission.
Thrashing is a method for backing up data to an external storage device.
What is the role of the SIGKILL signal in Unix-like operating systems, and how does it differ from SIGTERM?
Select the correct answer
The SIGKILL signal sends data between processes, while SIGTERM encrypts it.
The SIGKILL signal is used for debugging, while SIGTERM is used for normal process execution.
The SIGKILL signal restarts a process, while SIGTERM pauses it.
The SIGKILL signal forcefully terminates a process and cannot be caught or ignored, while SIGTERM requests a graceful termination.
What is RAID?
Select the correct answer
RAID is a method of compressing files to save disk space.
RAID (Redundant Array of Independent Disks) is a storage technology that combines multiple disk drives to improve performance and fault tolerance.
RAID is a type of software used for encrypting data.
RAID is a protocol for network communication between computers.
Explain the concept of a memory leak in software development.
Select the correct answer
A memory leak occurs when a program fails to release memory that is no longer needed, leading to gradual memory exhaustion.
A memory leak is a method of compressing data to save disk space.
A memory leak is a protocol for transferring large files over a network.
A memory leak is a process that runs in the background to monitor system performance.
What is the role of the chroot command in Unix-like operating systems?
Select the correct answer
The chroot command encrypts files to protect them from unauthorized access.
The chroot command schedules tasks to run at specified intervals.
The chroot command changes the root directory for the current process and its children, creating an isolated environment.
The chroot command is used to copy files from one directory to another.
What is a memory-mapped file?
Select the correct answer
A memory-mapped file allows file I/O to be treated as normal memory access, improving performance for large file operations.
A memory-mapped file is a type of file that stores backup data.
A memory-mapped file is a protocol used for secure data transmission.
A memory-mapped file is a method for encrypting files to protect against unauthorized access.
Explain the concept of dynamic linking in the context of shared libraries.
Select the correct answer
Dynamic linking is a method of encrypting data to enhance security.
Dynamic linking is a technique used for compressing large files.
Dynamic linking is a process of transferring data between different applications.
Dynamic linking allows programs to share common code libraries at runtime, reducing memory usage and disk space.
What is the purpose of an interrupt vector table in the context of operating systems?
Select the correct answer
The interrupt vector table manages memory allocation for applications.
The interrupt vector table is a list of processes currently running in the system.
The interrupt vector table is a protocol used for secure data transmission.
The interrupt vector table stores the addresses of interrupt handlers, enabling the CPU to quickly locate and execute them.
What is process migration?
Select the correct answer
Process migration is the act of converting a process from one programming language to another.
Process migration involves moving a process from one system to another for load balancing or fault tolerance.
Process migration is a method for backing up data to an external storage device.
Process migration is a technique for compressing data to save memory.
What is a daemon process in Unix-like operating systems?
Select the correct answer
A daemon process is a protocol for transferring data between computers.
A daemon process is a type of user application used for file management.
A daemon process is a graphical interface used to manage system resources.
A daemon process runs in the background and performs system-related tasks without direct user interaction.