Skip to main content

Healthcare Systems Article Category

Medical Factors Which make it The most effective  just by Sejal Kakadiya  Medicine and health agencies with now consentrate on top quality, charge together with great satisfaction health of their solutions. These are typically that support beams which a lot of these agencies redefine the direction they trade. The following really results in thrilled clients.  How come Serious Treatment Direction Can be a Trend Inside Medicine and health Sector  just by Steven Orange  A whole lot of North american healthcare systems' options are generally about that direction together with procedure with serious circumstances. Direction with serious health conditions which include diabetes, excessive circulation demand, cardiovascular disease, together with hypothyroidism can be a vital component of easiest treatment healthcare provider's succeed. Inside standard product, that general practitioner spots someone on an automobile accident with treatment, inspects that condition ...

MCQ of Operating System with answer set-4


1. .............. refers to a situation in which a process is ready to execute but is continuously denied access to a processor in deference to other processes.
A) Synchronization
B) Mutual Exclusion
C) Dead lock
D) Starvation

2. Which of the following is not the approach to dealing with deadlock?
A) Prevention
B) Avoidance
C) Detection
D) Deletion


3. Which of the following are the states of a five state process model?
i) Running            ii) Ready               iii) New                 iv) Exit                   v) Destroy
A) i, ii, iii and v only
B) i, ii, iv and v only
C) i, ii, iii, and iv only
D) All i, ii, iii, iv and v

4. State which statement is true for Suspended process?
i) The process is not immediately available for execution.
ii) The process may be removed from suspended state automatically without removal order.
A) i only
B) ii only
C) i and ii only
D) None

5. Following is/are the reasons for process suspension.
A) Swapping parent process
B) Inter request
C) Timing
D) All of the above

6. The different types of tables maintained by the operating system are .............
A) memory, logical , I/O file
B) memory, I/O, file, physical
C) memory, I/O, file, process
D) memory, logical, I/O, physical

7. Which of the following information not included in memory table?
A) The allocation of main memory to process.
B) The allocation of secondary memory to process
C) Any information needed to manage virtual memory
D) Any information about the existence of file

8. Process Management function of an operating system kernel includes.
A) Process creation and termination.
B) Process scheduling and dispatching
C) Process switching
D) All of the above

9. The typical elements of process image are .....................
i) User data         ii) System Data                  iii) User program              iv) System stack
A) i, iii and iv only
B) i, ii,  and iv only
C) ii, iii, and iv only
D) All i, ii, iii, and iv

10. Match the following mechanisms for interrupting the execution of a process and their uses.
i) Interrupt                                                                         a) Call to an operating system function
ii) Trap                                                                              b) Reaction to an asynchronous external event
iii) Supervisor Call                                                             c) Handling of a error or an exception condition
A) i-a, ii-b, iii-c
B) i-c, ii-a, iii-b
C) i-b, ii-c, iii-a
D) i-a, ii-c, iii-b

Answers:
1.   D) Starvation
2.   D) Deletion
3.   C) i, ii, iii, and iv only
4.   A) i only
5.   D) All of the above
6.   C) memory, I/O, file, process
7.   D) Any information..... of file
8.   D) All of the above
9.   A) i, iii and iv only
10.   C) i-b, ii-c, iii-a

You may also wanted to view the following related posts
For other more MCQs: Click Here

Comments

Popular posts from this blog

Solved MCQ of Computer Security set -1

1. In computer security, ……………………. means that computer system assets can be modified only by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity 2. In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity 3. The type of threats on the security of a computer system or network are …………………….. i) Interruption                   ii) Interception                  iii) Modification iv) Creation                         v) Fabrication A) i, ii, iii and iv only B) ii, iii, iv and v only C) i, ii, iii and v only D) All i, ii, iii, iv and v 4. Whi...

Solved MCQ for IT Officer Exam Part-2

SWIFT Logo (Photo credit: Wikipedia ) 1. SWIFT stands for: A) Society for Worldwide Interbank Financial Telecommunication B) Society for Worldwide International Financial Telecommunication C) Society for Worldwide Interbank Financial Transmission D) Society for Worldwide Interbank Financial Transfer 2. Which one is the correct statement? A) XML is a technology used only on the internet. B) XML is a programming language. C) XML is highly suitable data exchange between two different systems. D) XML is scripting language. 3. Decision support systems usually A) serve managers interested in weekly, monthly and yearly results, not day-to-day activities. B) help managers make decisions that are unique, rapidly changing and not easily specified in advance. C) provide managers with a generalized computing and telecommunications capacity that can be applied to a changing array of problems. D) perform and record the daily routine transactions necessary to the conduct of business. 4. Identifying...

Solved MCQ on Fundamental of C Language set-7

1) 'C' allows a three way transfer of control with the help of A. Unary Operator B. Relational Operator C. Ternary Operator D. Comparison Operator 2) Operators have hierarchy. It is used to know which operator .... A. is most important B. is used first C. is faster D. operators on large numbers 3) The statement that transfers control to the beginning of the loop is called .. A. break statement B. exit statement C. continue statement D. goto statement 4) C programming language was developed by .. A. Dennis Ritche B. Ken Thompson C. Bill Gates D. Peter Norton 5) The value that follows the keyword CASE may only be A. constants B. variable C. number D. semicolon 6) In a C language 'a' represents ... A. a digit B. an integer C. a character D. a word 7) The statement which is used to terminate the control from the loop is A. break B. continue C. goto D. exit 8) The continue command cannot be used with .... A. for B. switch C. do D. while 9) A self contained block of statement...