Deck 24: Operating System and Thread Pool

ملء الشاشة (f)
exit full mode
سؤال
A process can never be sure that a signal it has sent___________  

A)has which identifier
B)has not been lost
C)has been sent
D)all of the mentioned
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
In UNIX, the___________    system call is used to send a signal.

A)sig
B)send
C)kill
D)sigsend
سؤال
Thread pools are useful when

A)when we need to limit the number of threads running in the application at the same time
B)when we need to limit the number of threads running in the application as a whole
C)when we need to arrange the ordering of threads
D)none of the mentioned
سؤال
Instead of starting a new thread for every task to execute concurrently, the task can be passed to a___________        

A)process
B)thread pool
C)thread queue
D)none of the mentioned
سؤال
Each connection arriving at multi threaded servers via network is generally

A)is directly put into the blocking queue
B)is wrapped as a task and passed on to a thread pool
C)is kept in a normal queue and then sent to the blocking queue from where it is dequeued
D)none of the mentioned
سؤال
What is the idea behind thread pools?

A)a number of threads are created at process startup and placed in a pool where they sit and wait for work
B)when a process begins, a pool of threads is chosen from the many existing and each thread is allotted equal amount of work
C)all threads in a pool distribute the task equally among themselves
D)none of the mentioned
سؤال
If the thread pool contains no available thread___________

A)the server runs a new process
B)the server goes to another thread pool
C)the server demands for a new pool creation
D)the server waits until one becomes free
سؤال
Thread pools help in___________

A)servicing multiple requests using one thread
B)servicing a single request using multiple threads from the pool
C)faster servicing of requests with an existing thread rather than waiting to create a new thread
D)none of the mentioned
سؤال
The number of the threads in the pool can be decided on factors such as___________

A)number of cpus in the system
B)amount of physical memory
C)expected number of concurrent client requests
D)all of the mentioned
سؤال
The swaps processes in and out of the memory.

A)Memory Manager
B)CPU
C)CPU Manager
D)User
سؤال
Operating System maintains the page table for

A)each process
B)each thread
C)each instruction
D)each address
سؤال
What is operating system?

A)collection of programs that manages hardware
B)system service provider to the
C)link to interface the hardware and
D)all of the mentioned
سؤال
In a time-sharing operating system, when the time slot given to a process is completed, the process goes from the running state to the:

A)blocked state
B)ready state
C)suspended state
D)terminated state
سؤال
In virtual memory, which is not a page replacement algorithm ?

A)FIFO
B)BFS
C)LRU
D)Optimal
سؤال
Thrashing the CPU utilization.

A)increases
B)keep constant
C)decreases
D)None of the mentioned
سؤال
Mutual exclusion can be provided by the___________      

A)mutex locks
B)binary semaphores
C)both mutex locks and binary
D)none of the mentioned
سؤال
A parent process calling system call will be suspended until children processes terminate.

A)wait
B)fork
C)exit
D)exec
سؤال
The child process completes execution, but the parent keeps executing, then the child process is known as

A)Orphan
B)Zombie
C)Body
D)Dead
سؤال
When the process issues an I/O request___________      

A)It is placed in an I/O queue
B)It is placed in a waiting queue
C)It is placed in the ready queue
D)It is placed in the Job queue
سؤال
Which one of the following is the deadlock avoidance algorithm?

A)banker's algorithm
B)elevator algorithm
C)karn's algorithm
D)none of the mentioned
سؤال
File type can be represented by___________

A)file name
B)file extension
C)file identifier
D)none of the mentioned
سؤال
Which of the following are the two parts of the file name?

A)name & identifier
B)identifier & type
C)extension & name
D)type & extension
سؤال
Which of the following are forms of malicious attack?

A)Theft of information
B)Modification of data
C)Wiping of information
D)All of the mentioned
سؤال
From the following, which is not a common file permission?

A)Write
B)Execute
C)Stop
D)Read
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/24
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 24: Operating System and Thread Pool
1
A process can never be sure that a signal it has sent___________  

A)has which identifier
B)has not been lost
C)has been sent
D)all of the mentioned
has not been lost
2
In UNIX, the___________    system call is used to send a signal.

A)sig
B)send
C)kill
D)sigsend
kill
3
Thread pools are useful when

A)when we need to limit the number of threads running in the application at the same time
B)when we need to limit the number of threads running in the application as a whole
C)when we need to arrange the ordering of threads
D)none of the mentioned
when we need to limit the number of threads running in the application at the same time
4
Instead of starting a new thread for every task to execute concurrently, the task can be passed to a___________        

A)process
B)thread pool
C)thread queue
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
5
Each connection arriving at multi threaded servers via network is generally

A)is directly put into the blocking queue
B)is wrapped as a task and passed on to a thread pool
C)is kept in a normal queue and then sent to the blocking queue from where it is dequeued
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
6
What is the idea behind thread pools?

A)a number of threads are created at process startup and placed in a pool where they sit and wait for work
B)when a process begins, a pool of threads is chosen from the many existing and each thread is allotted equal amount of work
C)all threads in a pool distribute the task equally among themselves
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
7
If the thread pool contains no available thread___________

A)the server runs a new process
B)the server goes to another thread pool
C)the server demands for a new pool creation
D)the server waits until one becomes free
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
8
Thread pools help in___________

A)servicing multiple requests using one thread
B)servicing a single request using multiple threads from the pool
C)faster servicing of requests with an existing thread rather than waiting to create a new thread
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
9
The number of the threads in the pool can be decided on factors such as___________

A)number of cpus in the system
B)amount of physical memory
C)expected number of concurrent client requests
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
10
The swaps processes in and out of the memory.

A)Memory Manager
B)CPU
C)CPU Manager
D)User
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
11
Operating System maintains the page table for

A)each process
B)each thread
C)each instruction
D)each address
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
12
What is operating system?

A)collection of programs that manages hardware
B)system service provider to the
C)link to interface the hardware and
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
13
In a time-sharing operating system, when the time slot given to a process is completed, the process goes from the running state to the:

A)blocked state
B)ready state
C)suspended state
D)terminated state
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
14
In virtual memory, which is not a page replacement algorithm ?

A)FIFO
B)BFS
C)LRU
D)Optimal
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
15
Thrashing the CPU utilization.

A)increases
B)keep constant
C)decreases
D)None of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
16
Mutual exclusion can be provided by the___________      

A)mutex locks
B)binary semaphores
C)both mutex locks and binary
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
17
A parent process calling system call will be suspended until children processes terminate.

A)wait
B)fork
C)exit
D)exec
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
18
The child process completes execution, but the parent keeps executing, then the child process is known as

A)Orphan
B)Zombie
C)Body
D)Dead
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
19
When the process issues an I/O request___________      

A)It is placed in an I/O queue
B)It is placed in a waiting queue
C)It is placed in the ready queue
D)It is placed in the Job queue
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which one of the following is the deadlock avoidance algorithm?

A)banker's algorithm
B)elevator algorithm
C)karn's algorithm
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
21
File type can be represented by___________

A)file name
B)file extension
C)file identifier
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
22
Which of the following are the two parts of the file name?

A)name & identifier
B)identifier & type
C)extension & name
D)type & extension
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
23
Which of the following are forms of malicious attack?

A)Theft of information
B)Modification of data
C)Wiping of information
D)All of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
24
From the following, which is not a common file permission?

A)Write
B)Execute
C)Stop
D)Read
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.