Question 1: OS - Time-Sharing Operating System
What is the key advantage of a time-sharing operating system?
Question 2: OS - Modes of Operation
What are the two fundamental modes of operation in modern operating systems?
Question 3: OS - Role of PCB in Context Switching
How does the PCB help during context switching?
Question 4: OS - Advantages of Multithreading
Which of the following is a key advantage of multithreading in operating systems?
Question 5: OS - Preemptive vs Non-Preemptive SJF
How does preemptive SJF (also known as Shortest Remaining Time First, SRTF) differ from non-preemptive SJF?
Question 6: OS - Safe State Concept
In deadlock avoidance, what does a safe state mean?
Question 7: OS - FIFO Page Replacement
In FIFO page replacement, how is a page selected for replacement?
Question 8: OS - Indexed Allocation
What is the main advantage of indexed file allocation?
Question 9: OS - Semaphores
What are semaphores used for in operating systems?
Question 10: OS - Malware Types
Which of the following correctly matches malware with its primary characteristic?
Question 11: OS - Real-Time Operating System (RTOS)
What defines a Real-Time Operating System (RTOS)?
Question 12: OS - Kernel Mode Characteristics
Which of the following best describes kernel mode?
Question 13: OS - Context Switching Definition
What is context switching in process management?
Question 14: OS - Disadvantages of User-Level Threads
What is the major limitation of user-level threads?
Question 15: OS - Priority Scheduling
How does priority scheduling determine which process executes next?
Question 16: OS - Deadlock Detection
How does a system typically perform deadlock detection?
Question 17: OS - Page Faults
What happens when a page fault occurs?
Question 18: OS - Directory Structures
Which of the following directory structures allows the same file to appear in multiple directories without duplication of data?
Question 19: OS - Types of Semaphores
Which of the following correctly describes the two types of semaphores?
Question 20: OS - Malware Protection
Which method is most effective for preventing zero-day malware attacks?