Questions from Operating Systems


Q: When virtualization first appeared in the x86 marketplace, many server vendors

When virtualization first appeared in the x86 marketplace, many server vendors were skeptical of the technology and were concerned that consolidation would impact the sales of servers. Instead, server...

See Answer

Q: How is the process address space handled during process migration?

How is the process address space handled during process migration?

See Answer

Q: Suppose there are two types of philosophers. One type always picks

Suppose there are two types of philosophers. One type always picks up his left fork first (a “lefty”), and the other type always picks up his right fork first (a &a...

See Answer

Q: Providing additional bandwidth for virtualization servers initially involved additional network interface cards

Providing additional bandwidth for virtualization servers initially involved additional network interface cards (NICs) for more network connections. With the advent of increasingly greater network b...

See Answer

Q: Virtual machines are presented with storage in manners similar to physical machines

Virtual machines are presented with storage in manners similar to physical machines via TCP/IP, Fibre-Channel, or iSCSI connections. There are features in virtualization that optimize memory and proce...

See Answer

Q: In Table Q.1, what limitations should be placed in

In Table Q.1, what limitations should be placed in the use of/. Table Q.1:

See Answer

Q: Why does the eCos bitmap scheduler not support time slicing?

Why does the eCos bitmap scheduler not support time slicing?

See Answer

Q: The implementation of mutexes within the eCos kernel does not support recursive

The implementation of mutexes within the eCos kernel does not support recursive locks. If a thread has locked a mutex then attempts to lock the mutex again, typically as a result of some recursive cal...

See Answer

Q: Figure 13.12 is a listing of code intended for use

Figure 13.12 is a listing of code intended for use on the eCos kernel. Figure 13.12: a. Explain the operation of the code. Assume thread B begins execution first, and thread A begins to execute afte...

See Answer

Q: State some threats that result from a process running with administrator or

State some threats that result from a process running with administrator or root privileges on a system.

See Answer