1. What is a Real-time system?
(A) Used for monitoring events as they occur
(B) Primarily used on mainframe computers
(C) Used for real-time interactive users
(D) Used for program development
2. The __________ Operating System pays more attention to the meeting of the time limits.
(A) Network
(B) Distributed
(C) Online
(D) Real-time
3. In a real-time operating system, __________
(A) kernel is not required
(B) process scheduling can be done only once task
(C) must be serviced by its deadline period
(D) all processes have the same priority
4. The interrupt latency should be _________ for real-time operating systems.
(A) maximum
(B) minimal
(C) dependent on the scheduling
(D) zero
5. Which scheduling allocates an amount of CPU time to each process?
(A) equal share scheduling
(B) none of the mentioned
(C) earliest deadline first scheduling
(D) proportional share scheduling
6. What is the use of a robot by car manufacturing companies an example of?
(A) applicant controlled computers
(B) user-controlled computers
(C) machine controlled computers
(D) network controlled computers
7. When the system processes data instructions without any delay, it is called a…
(A) online system
(B) real-time system
(C) instruction system
(D) offline system
8. Which single task of a particular application is a process type of processor?
(A) applicant processor
(B) one task processor
(C) real-time processor
(D) dedicated processor
9. The designing of a system takes into consideration __________.
(A) operating system
(B) communication system
(C) hardware
(D) all of the above
10. The time duration required for a dispatcher to stop one process and start another is called…
(A) dispatch latency
(B) process latency
(C) interrupt latency
(D) execution latency
11. Which of the following is correct in real-time systems?
(A) non-preemptive kernels
(B) preemptive kernels
(C) neither preemptive nor non-preemptive kernels
(D) preemptive kernels or non-preemptive kernels
12. Which of the following does preemptive, priority-based scheduling guarantee?
(A) protection of memory
(B) hard real-time functionality
(C) soft real-time functionality
(D) all of the above
