Roll No. ......................
Total No. of Questions : 13]
Paper ID [A0519]
MCA (404)(Semester
- 4th)
OPERATING SYSTEMS
Time : 03 Hours
Instruction to Candidates:
1) Section - A is compulsory.
2) Attempt any Nine questions from Section - B.
Section - A
1.
a.
What is multiprocessing?
b.
Describe two different techniques for handling
the communications between a processor and devices.
c.
What is the essential difference between a block
special file and a character special file?
d.
What is device independence?
e.
What is the difference between a physical
address and a virtual address?
f.
What is a semaphore?
g.
What is the process o segmentation?
h.
What is an acrylic graph?
i.
What do you mean by thrashing?
j.
What are conditions for a deadlock to exist?
k.
What is Belady’s anomaly?
l.
What is a remote procedure call?
m. Describe
conditions under which a kernel may perform dispatching without performing
scheduling.
n.
What is the importance password security?
o.
How does salting improve password security?
Section –B
2.
Define, Compare and Contrast and between online
, real time, interactive computing and time sharing computing.
3.
How has distributed computing affected the
operating system desing?
4.
Why main memory is called random access memory?
Compare main memory to disk in terms of access
time, capacity and volatility
5.
What is meant by spooling? How does caching improves system performance?
6.
What is direct memory access? How DMA improves
system performance and cycle stealing.
7.
What is an interrupt ? what does it means for an
interrupt to be synchronous?
8.
What is inter-process communication? What is the
major drawback of using signals for IPC?
9.
What is mutual exclusion? Discuss Dekker’s
algorithm for mutual exclusion.
10. What is processor scheduling? Discuss the
shortest process first scheduling with the help of suitable examples.
11. What is the concept of deadlock? How to prevent
deadlock. Illustrate with the help of examples?
12.
What is demand paging? Discuss its advantages
and disadvantage.
13.
Can the Trojan horse attack work in a system
protected by capabilities? What is the difference between a virus and a worm
? how do they each reproduce?
0 comments:
Post a Comment
North India Campus