Deck 24: Operating System and Thread Pool

Full screen (f)
exit full mode
Question
A process can never be sure that a signal it has sent___________  

A)has which identifier
B)has not been lost
C)has been sent
D)all of the mentioned
Use Space or
up arrow
down arrow
to flip the card.
Question
In UNIX, the___________    system call is used to send a signal.

A)sig
B)send
C)kill
D)sigsend
Question
Thread pools are useful when

A)when we need to limit the number of threads running in the application at the same time
B)when we need to limit the number of threads running in the application as a whole
C)when we need to arrange the ordering of threads
D)none of the mentioned
Question
Instead of starting a new thread for every task to execute concurrently, the task can be passed to a___________        

A)process
B)thread pool
C)thread queue
D)none of the mentioned
Question
Each connection arriving at multi threaded servers via network is generally

A)is directly put into the blocking queue
B)is wrapped as a task and passed on to a thread pool
C)is kept in a normal queue and then sent to the blocking queue from where it is dequeued
D)none of the mentioned
Question
What is the idea behind thread pools?

A)a number of threads are created at process startup and placed in a pool where they sit and wait for work
B)when a process begins, a pool of threads is chosen from the many existing and each thread is allotted equal amount of work
C)all threads in a pool distribute the task equally among themselves
D)none of the mentioned
Question
If the thread pool contains no available thread___________

A)the server runs a new process
B)the server goes to another thread pool
C)the server demands for a new pool creation
D)the server waits until one becomes free
Question
Thread pools help in___________

A)servicing multiple requests using one thread
B)servicing a single request using multiple threads from the pool
C)faster servicing of requests with an existing thread rather than waiting to create a new thread
D)none of the mentioned
Question
The number of the threads in the pool can be decided on factors such as___________

A)number of cpus in the system
B)amount of physical memory
C)expected number of concurrent client requests
D)all of the mentioned
Question
The swaps processes in and out of the memory.

A)Memory Manager
B)CPU
C)CPU Manager
D)User
Question
Operating System maintains the page table for

A)each process
B)each thread
C)each instruction
D)each address
Question
What is operating system?

A)collection of programs that manages hardware
B)system service provider to the
C)link to interface the hardware and
D)all of the mentioned
Question
In a time-sharing operating system, when the time slot given to a process is completed, the process goes from the running state to the:

A)blocked state
B)ready state
C)suspended state
D)terminated state
Question
In virtual memory, which is not a page replacement algorithm ?

A)FIFO
B)BFS
C)LRU
D)Optimal
Question
Thrashing the CPU utilization.

A)increases
B)keep constant
C)decreases
D)None of the mentioned
Question
Mutual exclusion can be provided by the___________      

A)mutex locks
B)binary semaphores
C)both mutex locks and binary
D)none of the mentioned
Question
A parent process calling system call will be suspended until children processes terminate.

A)wait
B)fork
C)exit
D)exec
Question
The child process completes execution, but the parent keeps executing, then the child process is known as

A)Orphan
B)Zombie
C)Body
D)Dead
Question
When the process issues an I/O request___________      

A)It is placed in an I/O queue
B)It is placed in a waiting queue
C)It is placed in the ready queue
D)It is placed in the Job queue
Question
Which one of the following is the deadlock avoidance algorithm?

A)banker's algorithm
B)elevator algorithm
C)karn's algorithm
D)none of the mentioned
Question
File type can be represented by___________

A)file name
B)file extension
C)file identifier
D)none of the mentioned
Question
Which of the following are the two parts of the file name?

A)name & identifier
B)identifier & type
C)extension & name
D)type & extension
Question
Which of the following are forms of malicious attack?

A)Theft of information
B)Modification of data
C)Wiping of information
D)All of the mentioned
Question
From the following, which is not a common file permission?

A)Write
B)Execute
C)Stop
D)Read
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/24
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 24: Operating System and Thread Pool
1
A process can never be sure that a signal it has sent___________  

A)has which identifier
B)has not been lost
C)has been sent
D)all of the mentioned
has not been lost
2
In UNIX, the___________    system call is used to send a signal.

A)sig
B)send
C)kill
D)sigsend
kill
3
Thread pools are useful when

A)when we need to limit the number of threads running in the application at the same time
B)when we need to limit the number of threads running in the application as a whole
C)when we need to arrange the ordering of threads
D)none of the mentioned
when we need to limit the number of threads running in the application at the same time
4
Instead of starting a new thread for every task to execute concurrently, the task can be passed to a___________        

A)process
B)thread pool
C)thread queue
D)none of the mentioned
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
5
Each connection arriving at multi threaded servers via network is generally

A)is directly put into the blocking queue
B)is wrapped as a task and passed on to a thread pool
C)is kept in a normal queue and then sent to the blocking queue from where it is dequeued
D)none of the mentioned
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
6
What is the idea behind thread pools?

A)a number of threads are created at process startup and placed in a pool where they sit and wait for work
B)when a process begins, a pool of threads is chosen from the many existing and each thread is allotted equal amount of work
C)all threads in a pool distribute the task equally among themselves
D)none of the mentioned
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
7
If the thread pool contains no available thread___________

A)the server runs a new process
B)the server goes to another thread pool
C)the server demands for a new pool creation
D)the server waits until one becomes free
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
8
Thread pools help in___________

A)servicing multiple requests using one thread
B)servicing a single request using multiple threads from the pool
C)faster servicing of requests with an existing thread rather than waiting to create a new thread
D)none of the mentioned
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
9
The number of the threads in the pool can be decided on factors such as___________

A)number of cpus in the system
B)amount of physical memory
C)expected number of concurrent client requests
D)all of the mentioned
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
10
The swaps processes in and out of the memory.

A)Memory Manager
B)CPU
C)CPU Manager
D)User
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
11
Operating System maintains the page table for

A)each process
B)each thread
C)each instruction
D)each address
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
12
What is operating system?

A)collection of programs that manages hardware
B)system service provider to the
C)link to interface the hardware and
D)all of the mentioned
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
13
In a time-sharing operating system, when the time slot given to a process is completed, the process goes from the running state to the:

A)blocked state
B)ready state
C)suspended state
D)terminated state
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
14
In virtual memory, which is not a page replacement algorithm ?

A)FIFO
B)BFS
C)LRU
D)Optimal
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
15
Thrashing the CPU utilization.

A)increases
B)keep constant
C)decreases
D)None of the mentioned
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
16
Mutual exclusion can be provided by the___________      

A)mutex locks
B)binary semaphores
C)both mutex locks and binary
D)none of the mentioned
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
17
A parent process calling system call will be suspended until children processes terminate.

A)wait
B)fork
C)exit
D)exec
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
18
The child process completes execution, but the parent keeps executing, then the child process is known as

A)Orphan
B)Zombie
C)Body
D)Dead
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
19
When the process issues an I/O request___________      

A)It is placed in an I/O queue
B)It is placed in a waiting queue
C)It is placed in the ready queue
D)It is placed in the Job queue
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
20
Which one of the following is the deadlock avoidance algorithm?

A)banker's algorithm
B)elevator algorithm
C)karn's algorithm
D)none of the mentioned
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
21
File type can be represented by___________

A)file name
B)file extension
C)file identifier
D)none of the mentioned
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following are the two parts of the file name?

A)name & identifier
B)identifier & type
C)extension & name
D)type & extension
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following are forms of malicious attack?

A)Theft of information
B)Modification of data
C)Wiping of information
D)All of the mentioned
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
24
From the following, which is not a common file permission?

A)Write
B)Execute
C)Stop
D)Read
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 24 flashcards in this deck.