Cs3451-Operating-system 2 Mark 16questions
Cs3451-Operating-system 2 Mark 16questions
1. List and briefly define the four main elements of a computer? [R]
• Processor – Controls the operation of the computer & performs its data
processing functions
• Main memory – Stores data & programs.it is volatile.
• I/O modules – Move data between the computer & its external environment
such as disks, communication equipment & terminals.
• System Bus – Provides for communication among processors, main memory &
I/O modules.
2. Define the two main categories of processor register? [R]
Two categories are
User- visible registers: - It Enable the machine or assembly language
programmer to minimize main memory references by optimizing register use.
Control & Status registers: - Registers used by the processor to control the
operation of the processor.
3. In general terms, what are the four distinct actions that machine instruction can
specify? [An]
• Processor – Memory
• Processor –I/O
• Data Processing
• Control
4. What is an Interrupt? [R]
• Interrupt are provided primarily as way to improve processor utilization.
• It is a mechanism by which other modules( I/O, Memory) may interrupt the
normal sequencing of the processor.
Classes of interrupts:-
• Program
• Timer
• I/O
• Hardware failure
5. How are multiple interrupt dealt with? [An]
Two approaches can be taken to dealing with interrupts
• Disabled Interrupt – Processor ignores any new interrupt request signal.
• Define Priority for interrupt – It allows an interrupt of higher priority.
6. What characteristics distinguish the various elements of a memory hierarchy?
[R]
Characteristics are
1. Cost Per bit
2. Capacity
3. Access Time
4. Frequency of access to the memory by the processo
7. What is Cache Memory? [R]
1. Cache memory is invisible to the OS
2. It interacts with other memory management hardware
3. Cache contains a copy of a portion of main memory .
8. List and briefly define 3 Techniques of I/O operation? [R]
• Programmed I/O
• Interrupt Driven I/O
• Direct memory access
9. What is the distinction b/w spatial locality & temporal locality? [An]
Temporal locality refers to the reuse of specific data and/or resources within
relatively small time durations.
Spatial locality refers to the use of data elements within relatively close storage
locations.
Sequential locality, a special case of spatial locality, occurs when data elements
are arranged and accessed linearly, e.g., traversing the elements in a one-
dimensional array.
10. Define Locality of Reference [R]
Locality of reference, also known as the principle of locality, is the phenomenon
of the same value or related storage locations being frequently accessed.
There are two basic types of reference locality.
o Temporal locality refers to the reuse of specific data and/or resources within
relatively small time durations.
o Spatial locality refers to the use of data elements within relatively close
storage locations.
o Sequential locality, a special case of spatial locality, occurs when data
elements are arranged and accessed linearly, e.g., traversing the elements in a one-
dimensional array.
11. What is an operating system? (NOV/DEC 2013) [R]
An operating system is a program that manages the computer hardware. it
act as an intermediate between a user‘s of a computer and the computer hardware. It
controls and coordinates the use of t h e hardware among the various application
programs for the various users.
12. What are the 3 objective of an OS Design? [R]
• Convenience – An OS makes a computer more convenient to use
• Efficiency -- An OS allows the system resources to be used in efficient
manner
• Ability to Evolve – An OS Constructed in such a way as to permit the effective
development, testing & introducing new function.
13. List the Services of operating system function. (NOV/DEC 2013) [R]
1. Program development
2. Program execution
3. User Interface
4. I/O Operations
5. File system Manipulation
6. Communication
7. Error Detection
8. Resource allocation
9. Accounting
10. Security
14. Define Kernel[R]
The kernel is a software code that resides in the central core of a operating
system. It has complete control over the system.
15. Define system call. (MAY/JUNE 2009, APRIL/MAY 2019) [R]
System Call provides the interface between running program and the OS
User can request any services from OS through System Call.
Categories of system call:-
• File management
• Process Management
• Inter process Communication
• I/O Device Management
• Information Processing & Maintenance
16. What is System Programs? (APRIL/MAY 2011) [R]
System programs provides an convenient environment to the user for developing
and executing the programs.
Categories:-
1. File management
2. Status Information
3. File Modification
4. Programming language support
5. Program loading & execution
6. Communication
17. What is Boot strapping? [R]
The boot program is stored on disk with predetermined address called boot sector.
The boot program then loads the operating system into memory to startup the computer
this arrangement is known as bootstrapping.
18. Difference b/w Monolithic & Microlithic. [An]
Process state
Process number
Program counter
CPU registers
Memory limits
List of open files
CPU scheduling information
Memory management information
Accounting information
I/O status information
PART-B&C
1) Explain the FCFS, preemptive and non-preemptive versions of Shortest-Job First
andRound Robin (time slice = 2) scheduling algorithms with Gantt charts for the four
Processes given. Compare their average turnaround and waiting time. [E] (NOV/DEC
2012)
Process Arrival Time Waiting Time
P1 0 8
P2 1 4
P3 2 9
P4 3 5
PART-A
1) What is a file? [R]
A file is a named collection of related information that is recorded on secondary
storage. A file contains either programs or data. A file has certain "structure" based on its
type.
2) List the various file attributes. (APRIL/MAY 2011, NOV/DEC 2012)(MAY/JUNE
2014)(APRIL/MAY 2015) [R]
A file has certain other attributes, which vary from one operating system to another,
but typically consist of these:
• Identifier
• Name
• Type
• Location
• Size
• Protection
• Time
• Date
• User identification
3) What are the various file operations? (NOV/DEC 2012, APRIL/MAY 2015) [R]
The six basic file operations are:
• Creating a file
• Writing a file
• Reading a file
• Repositioning within a file
• Deleting a file
• Truncating a file
4) What are all the information‟s associated with an open file? [R]
Several pieces of information are associated with an open file which may be:
• File pointer
• File open count
• Disk location of the file
• Access rights
5) What are the different accessing methods of a file? (APRIL/MAY 2010) [R]
The different types of accessing a file are:
Sequential access: Information in the file is accessed sequentially
Direct access: Information in the file can be accessed without any particular order.
Other access methods: Creating index for the file, indexed sequential access
method (ISAM),etc.
6) What is Directory? [R]
The device directory or simply known as directory records information-such as
name, location, size, and type for all files on that particular partition. The directory can
be viewed as a symbol table that translates file names into their directory entries.
7) What are the operations that can be performed on a directory? [R]
The operations that can be performed on a directory are
• Search for a file
• Create a file
• Delete a file
• Rename a file
• List directory
• Traverse the file system
8) What are the most common schemes for defining the logical structure of a
directory? [R] (MAY/JUNE 2012)
The most common schemes for defining the logical structure of directory
• Single-Level Directory
• Two-level Directory
• Tree-Structured Directories
• Acyclic-Graph Directories
• General Graph Directory
9) Define UFD and MFD. [R]
In the two-level directory structure, each user has her own user file directory
(UFD). Each UFD has a similar structure, but lists only the files of a single user. When
a job starts the system's master file directory (MFD) is searched. The MFD is indexed
by the user name or account number, and each entry points to the UFD for that user.
10) What is a path name? [R]
A pathname is the path from the root through all subdirectories to a specified file.
In a two-level directory structure a user name and a file name define a path name.
11) What are the various layers of a file system? [R]
The file system is composed of many different levels. Each level in the design
uses the feature of the lower levels to create new features for use by higher levels.
i. Application programs
ii. Logical file system
iii. File-organization module
iv. Basic file system
v. I/O control vi Devices
12) What are the functions of virtual file system (VFS)? [R]
• It separates file-system-generic operations from their implementation defining a
clean VFS interface. It allows transparent access to different types of file systems
mounted locally.
• VFS is based on a file representation structure, called a vnode. It contains a
numerical value for a network-wide unique file .The kernel maintains one vnode
structure for each active file or directory.
13) Define seek time and latency time. [R]
The time taken by the head to move to the appropriate cylinder or track is called
seek time. Once the head is at right track, it must wait until the desired block rotates
under the read-write head. This delay is latency time.
14) What are the allocation methods of a disk space? [R]
Methods of allocating disk space which are widely in use are
• Contiguous allocation
• Linked allocation
• Indexed allocation
15) What are the advantages of Contiguous allocation? [R]
The advantages are
• Supports direct access
• Supports sequential access
• Number of disk seeks is minimal.
16) How can the index blocks be implemented in the indexed allocation scheme?
[R]
The index block can be implemented as follows
• Linked scheme
• Multilevel scheme
• Combined scheme
17) What is garbage collection? (MAY /JUNE 2012 ) [R]
Garbage Collection (GC) is a form of automatic memory management. The
garbage collector, or just collector, attempts to reclaim garbage, or memory occupied by
objects that are no longer in use by the program.
18) Mention the objectives of File Management System. (APR/MAY 2010) [R]
The system that an operating system or program uses to organize and keep track of
files. For example, a hierarchical file system is one that uses directories to organize files
into a tree structure.
19) What is the content of a typical file control block? (APR/MAY 2011,
APR/MAY 2010) [R]
File permissions
File dates (create, access,
write)
File owner, group, ACL
File size
File data blocks
File Control Block (FCB) is a file system structure in which the state of an open
file is maintained.
20) What are the two types of system directories? (MAY/JUNE 2012) [R}
Device directory, describing physical properties of files.
7) On a disk with 200 cylinders, numbered 0 to 199, compute the number of tracks the
disk arm must move to satisfy the entire request in the disk queue. Assume the last
request received was at truck 100. The queue in FIFO order contains requests for the
following tracks. 55, 58, 39, 18, 90, 160, 150, 38, 184. Perform the computation to find
the seek time for the following disk scheduling algorithms.
(i) FCFS
(ii)SSTF
(iii) SCAN
(iv) C-SCAN
(v) LOOK [E] (Nov/Dec 2015)
PART-A
1) What is Linux distribution?[R]
A Linux distribution includes all the standard components of the Linux system,
plus a set of administrative tools to simplify the initial installation and subsequent
upgrading of Linux and manage installation and removal of other packages on the
system.
2) What is the use of User mode? [R]
Under Linux, no user code is built into the kernel. Any operating-system-support
code that does not need to run in kernel mode is placed into the system libraries and runs
in user mode.
3) What are the components of kernel mode[R]
The module support under Linux has four components:
1. The module-management system allows modules to be loaded into memory
and to communicate with the rest of the kernel.
2. The module loader and unloader, which are user-mode utilities, work with the
module-management system to load a module into memory.
3. The driver-registration system allows modules to tell the rest of the kernel that
a new driver has become available.
4. A conflict-resolution mechanism allows different device drivers to reserve
hardware resources and to protect those resources from accidental use by another driver.
4) What is process Identity? [R]
Each process has a unique identifier. The PID is used to specify the process to the
operating system when an application makes a system call to signal, modify, or wait for
the process. Additional identifiers associate the process with a process group (typically, a
tree of processes forked by a single user command and login session.
5) Define DNS[R]
The Domain Name System (DNS) provides host-name-to-network-address
translations for the entire Internet. Before DNS became widespread, files containing the
same information were sent via e-mail or ftp between all networked hosts.
6) What is virtualization? [R]
Virtualization, in computing, refers to the act of creating a virtual (rather than
actual) version of something, including but not limited to a virtual computer hardware
platform, operating system (OS), storage device, or computer network resources.
14) Mention any two features of Linux file systems. (APR/MAY 2017)[U]
✓ Portable
✓ Open Source
✓ Multi user
✓ Multi Programming
17) List the advantages of Linux OS.[U] (NOV/DEC 2017)
Advantages of Linux OS:
Low cost
Stability
Performance
Security, Flexibility, Compatibility
18) Write the purpose of using virtualization.[R] (NOV/DEC 2017)
Operating system virtualization provides application-transparent virtualization to
users by decoupling applications from the OS. The OS virtualization technique offers
granular control at the application level by facilitating the transparent migration of
individual applications. OS virtualization can also be used to migrate critical applications
to another running operating system instance.
19) List the advantages and disadvantage of writing an operating system in high
level language such as C.[R] (APR/MAY 2018)
The code can be written faster, is more compact, and is easier to understand and
debug. In addition, improvements in compiler technology will improve the generated
code for the entire operating system by simple recompilation. Finally, an operating
system is far easier to port to move to some other hardware if it is written in a higher-
level language
20) What is handle? How does a process obtain a handle? [U] (APR/MAY 2018)
The handle is an integer value in the operating system assigned to the associated
process when the process was started. The system uses this handle to keep track of
process attributes. An application can obtain a handle to a process that can be used as a
parameter to many process-information and control functions.
21. Write short notes on driver registration in Linux. (APR/MAY 2019)
The driver registration allows modules to tell the rest of the kernel that a new driver has
become available.
22. List out the methods used to recover from the deadlock. (APR/MAY 2019)
We can use a protocol to prevent or avoid deadlocks, ensuring that the system will never
enter a deadlocked state.
• We can allow the system to enter a deadlocked state, detect it, and recover.
• We can ignore the problem altogether and pretend that deadlocks never occur in the
system.
23.What are the Components of a Linux System?
Every OS has component parts, and the Linux OS also has the following components
parts:
• Boot loader
• OS Kernel
• Background services
• OS Shell
• Graphics server
• Desktop environment
• Applications.
24.Which layer of iOS contains fundamental system services for apps?
The Core Services layer contains the fundamental system services that all
applications use, The Core Services layer provides an abstraction over the services
provided in the Core OS layer. It provides fundamental access to iOS services and
consists of the following components:
▪ Collections
▪ Address Book
▪ Networking
▪ File Access
▪ SQLite
▪ Core Location
▪ Net Services
▪ Threading
▪ Preferences
▪ URL Utilities
PART-B & C
1. Explain in detail about the concepts of Linux system. [U]
2. Explain in detail about virtualization [U]
3. Explain in detail about setting up a Linux mainframe server [An]
4. Explain in detail about Linux host and adding guest OS [U]
5. Explain the significance and steps involved in setting up Xen, VMware software‘s on
Linux host for successful virtualization in detail. [An] May/June 2015
6. Briefly discuss about the requirements to become a Linux system administrator.
[An] May/June 2015
7. Discuss about the steps involved in the installation of a Linux Multifunction server.
[An] May/June 2015
8. Write a short note on Linux Network Services. [U] May/June 2015
9. Write about LINUX architecture and LINUX kernel with neat sketch. [U] (Nov/Dec
2015)
10. Explain in detail about LINUX multifunction server, DNS VMware on LINUX host.
[An] (Nov/Dec 2015)
*************