Aspire Faculty ID #14622 · Topic: UGC NET Computer Science 26 June 2025 (Paper II) · Just now
UGC NET Computer Science 26 June 2025 (Paper II)

Consider the following interrupt protection levels in Linux, and arrange them in the increasing order of their priorities:
  • A. User-Mode Programs (Preemptible)
  • B. Bottom Half Interrupt Handlers
  • C. Top Half Interrupt Handlers
  • D. Kernel System Service Routines (Preemptible)
Choose the correct answer from the options given below:

Solution

  • User-Mode Programs have the lowest priority and are preemptible.
  • Kernel System Service Routines run in kernel mode and can be preempted by higher priority tasks like interrupts.
  • Bottom Half Interrupt Handlers execute after the top half and have higher priority than kernel threads.
  • Top Half Interrupt Handlers handle immediate hardware responses and have the highest priority.

Previous 10 Questions — UGC NET Computer Science 26 June 2025 (Paper II)

Nearest first

Next 10 Questions — UGC NET Computer Science 26 June 2025 (Paper II)

Ascending by ID
1
Consider relation R(A, B, C, D, E) with the following functional dependencies: C → F, E → A, EC → D, A → B. Wh…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
2
Which of the following trees are height balanced? A. Binary Search Tree B. AVL Tree C. Red-Black Tree D…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
3
Let P denote “She is intelligent” and Q denote “She is happy.” Given statements: (a) If she is intelligent, the…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
4
The process followed in order to find difficult, unknown and hidden information about a software system is called:
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
5
When developing a dynamic programming algorithm, the sequence of steps followed is: A. Construct an optimal s…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
6
The packet sent by a node to the source to inform it of congestion is called:
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
7
In a pack of 42 cards, 3 cards are chosen one after the other without replacement. Find the number of ways this can…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
8
The transformation of data from main memory to cache memory is referred as:
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
9
Match List I with List II: List I List II A. Address Space I. Associative Mappi…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
10
Consider the following table defining the sample inputs and corresponding target values for a perceptron model. …
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
Ask Your Question or Put Your Review.

loading...