In the readers-writers problem, what is the primary goal of the synchronization mechanism used?
To prevent readers from reading while a writer is writing.
To ensure all writers can write immediately.
To allow writers to read before writing.
To maximize the number of concurrent readers.
What type of resource virtualization involves pooling hardware, storage, and network resources for agile computing?
Resource Pooling
Dynamic Resource Management
Software Virtualization
Storage Virtualization
What is a major advantage of using the Banker's Algorithm?
It increases resource utilization.
It prevents starvation.
It simplifies resource allocation logic.
It guarantees safe resource allocation if possible.
Which of the following best defines resource virtualization?
The ability to create logical versions of physical resources
Isolating applications on different operating systems
A technique for load balancing across multiple servers
A method to backup resources in cloud environments
What is a primary characteristic of Type 1 hypervisors?
Runs directly on hardware
Less efficient than Type 2
Dependent on application runtime
Requires a host operating system
Which of the following is an example of a multithreading issue that can lead to deadlock?
Two threads waiting for each other to release resources.
A thread being starved of resources.
An improper context switch.
A thread exceeding its time slice.
What happens to a process when it calls the exit system call?
It waits for other processes to finish
It is terminated and cannot be resumed
It enters the Blocked state
It moves to the Ready state
What is the key difference between a virtual machine and a container?
Virtual machines run entire operating systems; containers run applications and their dependencies
Containers are slower than virtual machines
Containers virtualize at the hardware level; virtual machines do not
Virtual machines share the host OS; containers do not
In the context of the critical section problem, which of the following conditions must be avoided to prevent deadlock?
Mutual exclusion
Circular wait
No preemption
Hold and wait
Which virtualization technique is most effective for network resources?
Disk Virtualization
Application Virtualization
Memory Virtualization
Network Virtualization