You are on page 1of 4

Set No.

Code No: 220503 1


II B.Tech., II Semester Supplementary Examinations, November-2003
OPERATING SYSTEMS
(Common to Computer Science and Engineering, Computer Science and Information
Technology, Computer Science and Systems Engineering)

Time:3 hours Max Marks:80


Answer any Five Questions
All questions carry equal marks.
-----
1. Mention the various registers and their functions under the following categories.
(a) User-visible registers (b) Control and status registers.

2.a) Explain the reasons for process termination.


b) Describe the single blocked queue and multiple blocked queues with and example.

3. Using an example get the solution to the mutual exclusion problem by using
Semaphore and explain the process clearly.

4. What is deadlock avoidance? Explain process initiation denial and resource allocation
denial in detail with example.

5.a) Consider a dynamic partitioning scheme. Prove that on an average the memory
contains half as many holes as segments.
b) What are the steps involved in loading a program in memory.
c) Compare and Contrast the different approaches to loading.

6.a) Which type of process is generally favoured by a multi-level feed back queuing
scheduler, a processor bound process or an I/O bound process ?. Briefly explain why?
b) Consider a variation of round–robin that we will call priority round-robin. In priority
round-robin each process has a priority in the range of 1 to 10. When a process is given a
time slice the length of quantum is basic constant (say 50 ms) times the priority of the job.
Compare this system with an ordinary priority system.

7.a) What do you understand by a file directory?


b) Explain briefly the information elements of a file directory
c) Explain what is tree-structured directory.

8.a) Explain the nature of viruses.


b) Discuss about various types of viruses.
c) Describe the anti-viruse approaches.

!!!!!
Set No.

Code No: 220503


2
II B.Tech., II Semester Supplementary Examinations, November-2003
OPERATING SYSTEMS
(Common to Computer Science and Engineering, Computer Science and Information
Technology, Computer Science and Systems Engineering)

Time:3 hours Max Marks:80


Answer any Five Questions
All questions carry equal marks.
----

1. Describe the following :


(a) Virtual Memory (b) Cache Memory (c) Auxiliary Memory.

2.a) Describe various operations on threads.


b) Discuss about threads synchronization.
c) Write about Kernel level threads.

3. What is a monitor? Compare it with semaphore. Explain in detail a monitor with notify
and broadcast using an example.

4. What are the principles of deadlock and explain in detail the two categories of
resources.

5.a) Explain with a neat sketch.


i. Address translation in a segmentation system
ii. Address translation in a paging system.

6.a) Describe about various disk performance parameters?


b) We noted that successive requests are likely to be from the same cylinder. What does this
imply about the expected performance of the FCFS and SSTF disk scheduling
algorithms.

7.a) Explain in detail the four terms field, record, file and database with respect to files.
b) List the objectives and the requirements for a file management system

8. Write notes on :
(a) intrusion detection (b) password protection.

!!!!!
Set No.

Code No: 220503 3


II B.Tech., II Semester Supplementary Examinations, November-2003
OPERATING SYSTEMS
(Common to Computer Science and Engineering, Computer Science and Information
Technology, Computer Science and Systems Engineering)
Time:3 hours Max Marks:80
Answer any Five Questions
All questions carry equal marks.
----

1.a) DMA access to main memory is given higher priority than processor access to main
memory. Why? Explain with an example.
b) Explain the characteristics of Two level memories.

2.a) Define the following:


(i) Process (ii) Program (iii) Process state (iv) Process control block
(v) Process Scheduling.
b) Explain the process State Transition diagram with examples.

3. Explain the various mechanisms provided by UNIX for inter processor


communication and synchronization in detail.

4.a) What are the conditions that must satisfy for deadlock occurrence and explain them.
b) Is the deadlocks problem preventable? Justify your answer with example and diagram.

5.a) Explain the concept of page buffering. Substantiate its need in paging.
b) Discuss the relation between Replacement policy and cache size.
c) Enumerate the factors that influence when an Operating System decides the
quantum of main memory to be allocated to a particular process.
d) Write short notes on fixed allocation.

6. Suppose we have a disk with 200 tracks. The disk head starts at track100, and moving in
the direction of decreasing track number. For the following sequence of disk track
requests 27, 129, 110, 186, 147, 41, 10, 64, 120, compute the average seek time for the
following disk scheduling algorithms FIFO, SSTF, Scan, C-Scan. Queue contains the
following request in order at time 0, 27,129,110,186,147, 41, 20, 64, 120. Compute the
average time to service a request for the disk head scheduling algorithm FCFS.

7. Write short notes on:


(a) Sequential file (b) Indexed file (c) Indexed sequential file (d) Direct file.

8. Write short notes on:


(a) Trojan Horse defense (b) Trojan horses.

!!!!!
Set No.

Code No: 220503 4


II B.Tech., II Semester Supplementary Examinations, November-2003
OPERATING SYSTEMS
(Common to Computer Science and Engineering, Computer Science and Information
Technology, Computer Science and Systems Engineering)

Time:3 hours Max Marks:80


Answer any Five Questions
All questions carry equal marks.
----

1.a) What is symmetric multiprocessing? Explain the Win NT objects.


b) Explain the properties of Unix OS.

2.a) What is Swapping? Explain the need for swapping. .


b) Explain the general structure of operating system control tables with an example.

3. What is message passing? Explain the design characteristics of message systems for inter
process communication and synchronization.

4. Give the conditions for deadlock and explain the methods of preventing deadlock.

5.a) Differentiate between demand cleaning and pre-cleaning.


b) What is the difference between a resident set and a working set
c) A process references five pages A, B, C, D, and E, in the following order: A; C; B; E;
A; B; E; A; B; C; D; E; Assume the replacement algorithm is first-in-first- out. Find the
number of page transfers during this sequence of references starting with an empty main
memory with three page frames. Repeat for four page frames.

6.a) Explain in detail about disk cache performance using frequency based replacement.
b) The following equation was suggested both for cache memory and disk cache memory
Ts=Tc+M * TD
Generalize this equation to a memory hierarchy with N levels instead of just 2 levels.

7.a) What are the various types of operations that may be performed on the directory.

b) What are the various access rights that can be assigned to a particular user for a
particular file.
c) Explain different methods of record blocking.

8.a) What are the security requirements of a computer and network.


b) Explain different types of threats.
c) Explain the computer system assets.

!!!!!

You might also like