Who should Practice these Operating Systems Questions?
Anyone wishing to sharpen their skills on Operating Systems.
Anyone preparing for aptitude test in Operating Systems.
Anyone preparing for interviews (campus/off-campus interviews, walk-in interview & company interviews)
Anyone preparing for entrance examinations and other competitive examinations.
All – Experienced, Freshers and Students.
Inside-
-------
Operating System Basics -----------------------------------------------------------------------6
Processes ----------------------------------------------------------------------------------------- 8
Process Control Block--------------------------------------------------------------------------10
Process Scheduling Queues----------------------------------------------------------------- 12
Process Synchronization----------------------------------------------------------------------15
Process Creation------------------------------------------------------------------------------- 17
Inter Process Communication---------------------------------------------------------------19
Remote Procedure Calls-----------------------------------------------------------------------21
Process Structures------------------------------------------------------------------------------23
CPU Scheduling----------------------------------------------------------------------------------26
CPU Scheduling Benefits----------------------------------------------------------------------28
CPU Scheduling Algorithms I --------------------------------------------------------------- 31
CPU Scheduling Algorithms II ---------------------------------------------------------------34
Critical Section (CS) Problem and Solutions- --------------------------------------------37
Semaphores I -----------------------------------------------------------------------------------39
Semaphores II ----------------------------------------------------------------------------------43
The Classic Synchronization Problems----------------------------------------------------46
Monitors------------------------------------------------------------------------------------------49
Atomic Transactions---------------------------------------------------------------------------51
Deadlock -----------------------------------------------------------------------------------------54
Deadlock Prevention---------------------------------------------------------------------------56
Deadlock Avoidance ---------------------------------------------------------------------------59
Deadlock Detection ----------------------------------------------------------------------------63
Deadlock Recovery-----------------------------------------------------------------------------65
Memory Management –Swapping Processes I -----------------------------------------67
Memory Management – Swapping Processes II -------------------------------------- 70
Memory Management ---------------------------------------------------------------------- 73
Memory Allocation I ------------------------------------------------------------------------- 75
Memory Allocation II --------------------------------------------------------------------------78
Paging – I -----------------------------------------------------------------------------------------80
Paging – II ----------------------------------------------------------------------------------------83
Segmentation------------------------------------------------------------------------------------86
I/O System – Application I/O Interface – I -----------------------------------------------89
I/O System – Application I/O Interface – II ----------------------------------------------92
I/O System – Kernel I/O Subsystems ------------------------------------------------------95
RTOS ----------------------------------------------------------------------------------------------97
Implementing RT Operating Systems -----------------------------------------------------99
Implementing RT Operating Systems ----------------------------------------------------101
Real Time CPU Scheduling – I --------------------------------------------------------------103
Real Time CPU Scheduling – II -------------------------------------------------------------106
Multimedia Systems -------------------------------------------------------------------------108
Multimedia System – Compression – I --------------------------------------------------110
Multimedia System – Compression – II--------------------------------------------------113
Multimedia System – Compression – III-------------------------------------------------115
CPU and Disk Scheduling -------------------------------------------------------------------117
Network Management ----------------------------------------------------------------------119
Security – User Authentication -----------------------------------------------------------122
Security – Program and System Threats-------------------------------------------------125
Security – Securing Systems and Facilities ---------------------------------------------129
Security – Intrusion Detection ------------------------------------------------------------132
Security – Cryptography --------------------------------------------------------------------135
Secondary Storage ---------------------------------------------------------------------------137
Linux ---------------------------------------------------------------------------------------------139
Threads -----------------------------------------------------------------------------------------141
User and Kernel Threads -------------------------------------------------------------------143
Multi Threading Models --------------------------------------------------------------------146
The Fork and exec System Calls -----------------------------------------------------------148
Thread Cancellation -------------------------------------------------------------------------150
Signal Handling -------------------------------------------------------------------------------152
Thread Pools ----------------------------------------------------------------------------------155
Virtual Memory -------------------------------------------------------------------------------157
Virtual Memory – Demand Paging -------------------------------------------------------159
Page Replacement Algorithms – I- -------------------------------------------------------162
Page Replacement Algorithms – II--------------------------------------------------------165
Allocation of Frames -------------------------------------------------------------------------168
Virtual Memory – Thrashing ---------------------------------------------------------------171
File System Concepts ------------------------------------------------------------------------174
File System Implementation----------------------------------------------------------------176
File System Interface Access Methods – I-----------------------------------------------178
File System Interface Access Methods – II----------------------------------------------180
File System Interface Directory Structure – I-------------------------------------------182
File System Interface Directory Structure – II------------------------------------------185
File System Interface Mounting and Sharing ------------------------------------------188
File System Interface Protection ----------------------------------------------------------191
File System ImplementationAllocation Methods – I----------------------------------194
File System Implementation–Allocation Methods – II-------------------------------197
File System Implementation–Allocation Methods – III------------------------------200
File System Implementation – Performance - -----------------------------------------203
File System Implementation – Recovery -----------------------------------------------205
File System Implementation – Network File System –I------------------------------207
File System Implementation – Network File System –II---------------------------- 209
I/O Subsystem ---------------------------------------------------------------------------------211
Disk Scheduling – I----------------------------------------------------------------------------213
Disk Scheduling – II---------------------------------------------------------------------------215
Disk Management ----------------------------------------------------------------------------218
Swap Space Management ------------------------------------------------------------------220
RAID Structure – I-----------------------------------------------------------------------------223
RAID Structure – II----------------------------------------------------------------------------226
Tertiary Storage -------------------------------------------------------------------------------229
Protection – Access Matrix -----------------------------------------------------------------231
Protection Concepts -------------------------------------------------------------------------235
Security -----------------------------------------------------------------------------------------237
Memory Protection --------------------------------------------------------------------------239
Protection – Revocation of Access Rights ----------------------------------------------242
Distributed Operating System -------------------------------------------------------------245
Types & Resource Sharing - ----------------------------------------------------------------247
D-OS Network Structure & Topology - --------------------------------------------------250
Robustness of Distributed Systems ------------------------------------------------------252
Distributed File System – I------------------------------------------------------------------254
Distributed File System – II-----------------------------------------------------------------256
Distributed File System – III----------------------------------------------------------------258
Distributed Coordination -------------------------------------------------------------------260
Distributed Synchronization ---------------------------------------------------------------263
Harry, is an Anonymous Hacktivist, computer Programmer and scientifically Hacking Professional has a unique experience in the field of computers Programming, Hacking and Cyber Security.
-Team Anonymous.