Very Short Answer Type Questions:-
1)What is Memory-Management Unit (MMU)?
2) Why are page sizes always powers of 2?
3) What is virtual memory?
4) Concept of Recovery from Deadlock?
5) What is starvation and aging?
6) List the 4 Condition for deadlock occurrence?
7) What is a Real-Time System?
8) What is CPU Scheduler?
9) What is Throughput?
10) What is Turnaround time?
11) What is Waiting time and Response time?
12) What is Dispatcher?
13) Describe common functions of Interrupts?
14) What is Context Switch?
15) Why paging is used?
16)What are the 3 major purpose of an Operating System?
17) What is Graceful Degradation and Fault Tolerant System?
18) Define Operating System, giving abstract view of
components along with it?
19) What is Spooling, explain with diagram?
20) Define Job scheduling and CPU Scheduling?
21) What are 3 major activities of an Operating System in
terms of Memory Management?
22) What is the purpose of System Calls?
23) Define System Programs?
24) Define Process and the 5 different states during its
execution?
25) Explain the CPU I/O Burst Cycle?
26) Define Dispatcher?
27) Why paging is used?
28) What do you mean by deadlock?
29) What is Mutual
Exclusion?
30) Define Demand Paging?
31) What is
thrashing?
32) Define different attributes of a File?
33) What is Memory Mapping?
34) What would be the result of the system running too many
I/O intensive jobs?
35)What is System Call?
36) What is the main advantage of using deadlock detection
instead of prevention or avoidance?
37) A round robin system uses swapping to free process
memory space. What should be the relative sizes of the time slot and swap
time to ensure efficient process utilization?
38) What is meant by
saying that program is reentrant?
39) What 2 events can cause a process to loose control of
the processor?
40) Define Multics?
41) Explain the Access Matrix?
42) What do you understand by Global Table?
43) What is a Lock key Mechanism?
44) What is Authentication/ Explain.
45) Define the term Password?
46) Define Encrypted Passwords?
47) Define Worms ?
48) What is a Worm?
49) Define Firewall?
50) Explain Disk Scheduling?
51) What is Disk Structure?
52) Explain C-Scan Scheduling?
53) What is Disk Formatting?
54) Define Low level Formatting?
55) What is Swap Space Management?
56) What is Disk Striping?
57)What is File System Mounting?
58) Define term Linked List?
59) What is a Hash Table?
60) What are the 2 levels at which we must protect the
system?
61) What is Trojan Horse?
62) What is a Worm?
63) What is Threat Monitoring?
64) Explain Global Table?
65)What is the Structure of a Page Table?
66) What is Inverted Page Table?
67) What is Fragmentation?
68) Why are Segmentation and Paging sometimes combined into
1 scheme?
69) What is Dispatch Latency?
70) What are the 4 circumstances under which CPU scheduling
takes place?
71) Explain Parallel System?
72) Explain System Calls?
73) What is Device Management?
74) What is the purpose of System Programs?
75) What is a medium term Scheduler?
76) Explain the term Interprocess Communication?
77) What is a Co-operating Process?
78) What are the 2 disadvantages of protocols used to avoid
Deadlock under Hold and Wait?
79) Explain the Resource Request Algorithm?
80) What is Deadlock Detection?
81) Define CPU scheduler and Job Scheduler?
82) Explain Process Creation?
83) What is Page Fault?
84) What is Dynamic Loading?
85)What is Swapping?
86)Explain Process Termination?
87)Define Multiple Partition Allocation?
88)Explain the solution to the Problem of External
Fragmentation?
89)What is Dynamic Linking?
90)Explain the term Frames and Pages?
91) Explain the disadvantage of Paging?
92) Define the term Segmentation?
93) List the Page Replacement Algorithms?
94)What is a File Organization Module?
95) Define Indexed Allocation of Disk Space?
96) What is a Frame Table?
97)list the steps in Handling Page Fault?
98)What is Inverted Page Table?
99) Explain the terms LDT and GDT?
100) Explain OS/2 32 bit version?
Short Answer Type Questions:-
1)What is the difference between Hard and Soft real-time
systems?
2)Difference between Logical and Physical Address Space?
3)Define Demand Paging, Page fault interrupt, and Trashing?
4) What is a Safe
State and its’ use in
deadlock avoidance?
5) Explain the Usage of Deadlock Detection-Algorithm?
6) What are the Methods for Handling Deadlocks?
7) Explain the Resource Allocation Graph representing the
Deadlock and the non deadlock conditions?
8) What are the basic functions of an operating system?
9)
What are the different tasks of Lexical analysis?
10) List and Explain the reasons for building Distributed
Systems?
11) Explain (1) Batch Systems
(2)
Real Time Systems
(3) Multi Programmed Systems
12) What is the main
advantage of Layered Approach to System Design?
13) Explain the
Process Control Block of a Process?
14) Explain the term Scheduler? What are the 2 different
types of Scheduler?
15) Explain the different Operation which occurs on
Processes?
16) Explain
Preemptive Scheduling?
17) What is the Scheduling Criteria behind the scheduling of
a Process?
18) Difference
between multi threading and multi tasking?
19) Explain Swapping?
20) Explain Internal and External Fragmentation?
21) Explain Multilevel Paging?
22) Explain Protection and Sharing?
23) Describe Implementation of Segment Tables?
24) Explain the term Page Replacement?
25) Explain the different Operations on a File which can be
performed?
26) What are the 2 different access methods?
27) Distinguish between Preemptive and Non-Preemptive
scheduling?
28) What would be the effect using the FCFS scheme if the
running process got stuck in an infinite loop?
29) Comment on the principal disadvantage of FCFS, SJF,RR?
30) How security features have been provided in Windows NT?
Discuss
31) What do you understand by free space management
techniques. Explain them?
32) What is the critical section in the concurrent
processes? How it can be handeled.
33) What are the various disk scheduling techniques?
34) Explain MFT and MVT?
35) What are the main differences between capability lists
and access lists?
36)What is the need-to-know principle? Why is it important
for a protection system to adhere to this principle?
37) What problems may arise if a shared stack is used for
Parameter Passing?
38)What are the 2 advantages of encryption data stored in
the Computer System?
39) Explain Scan Scheduling?
40) Explain SSTF Scheduling?
41) Explain in detail the File System Organization?
42) What do you understand by the term Linked Allocation?
Explain
43) Explain File
Allocation Table with diagram?
44) Explain the term Thrashing? Also explain the cause of
Thrashing.
45) Explain the terms LFU and MFU algorithms?
46) Define Global vs Local Allocation?
47) What do you mean by Inverted Page Table?
48) What is Page Replacement? Explain the need of Page
Replacement.
49) Explain the steps in Handling a Page Fault?
50) Explain Fragmentation?
Long Answer Type Questions:-
1)What is fragmentation? Different types of fragmentation?
2)Explain Segmentation with paging?
3)Under what circumstances do page faults occur? Describe
the actions taken by the operating system when a page fault occurs?
4)What is the cause of thrashing? How does the system detect
thrashing? Once it detects thrashing, what can the system do to eliminate this
problem?
5) What resources are used when a thread created? How do
they differ from those when a process is created?
6) Explain the different Scheduling Algorithms during the
scheduling of a Process?
7) Given the chart
below for the arrival and the burst time of different processes, schedule the
processes according to
1) SJF
algorithm
2) Round
Robin Scheduling ( Time Quantum= 5ms)
3) Fist Come
First Served Basis
Process Arrival
Time Burst Time
P1 0 8
P2 1 4
P3 2
9
P4 3 5
8) Difference
between Primary storage and secondary storage?
9) Explain
the Bankers Algorithm and Safety Algorithm?
10)Explain Semaphores with its
Implementation and Usage?
11) Explain the classical problems
of Synchronization?
12) Explain Logical vs Physical
Address Space?
13) Define Contiguous Allocation?
Explain the 2 types of Contiguous Allocation.
14) Explain the following
allocation Algorithms?
a) First Fit
b) Best Fit
c) Worst Fit
15) Explain Segmentation with
Paging?
16) What are the different Page
Replacement Algorithms?
17) When do Page Fault occurs?
Describe the actions taken by the Operating System when the page fault occurs?
18) What is the cause of
Thrashing? How does the system detect Thrashing? What can the system do to
eliminate this problem?
19) Explain the Directory
structure and the different levels of Directory Structure?
20) What do you understand by
Encryption and Decryption? Give Encryption and Decryption algorithms?
21) Explain the various directory
structures used in Operating System for storing files. Give Merits and Demerits
of all the directory structures.\
22) Examine the following table of resource
requirement for the 4 processes and determine whether the current allocation is
safe state, with regard to avoid deadlock.
Process Max
Need Current
Usage
P1 7 3
P2 4 1
P3 6 2
P4
6 1
Total resources=10
Available resources=3
23) Write short notes on:-
a) Real Time Operating System
b) UNIX Kernel
c) DEC net.
24)
Describe the various technique for Password Protection
and Cryptography.
25)
Discuss Inode Structure and its use in UNIX.
26)
When a process attempts to delete a file, the operating
system must ensure that the process has delete access to that file. Using the
UNIX directory and inode structure, explain how unix can determine if the file:
/student/os/file
can be deleted by a process with user id 0f 20 and a group id of 40.
27)
Using the UNIX file system assume that the inode of the
current directory is known. Explain how to find the inode of the filel( if the
file exists)
28)
Explain in detail Program Threats and the System
Threats.
29)
A password may become known to other users in a variety
of ways. Is there a simple method for detecting that such an event has
occurred. Explain your answer.
30)
Discuss the relative merits of sector sparing and
sector slipping?
31)
Explain Indexed Aloocation? Also explain the issues it
deals with.
32)
Explain all the Page Replacement Algorithms?
33)
Difference
between Primary storage and secondary storage?
34)
Explain the
access matrix with 3 additional operations Copy, Owner, Control?
35)
Why is it
difficult to protect a system in which users are allowed to do their own I/O?
36)
What is the
need-to-know principle? Why is it important for a protection system to adhere
to this principle?
37)
Explain the
method for selecting a Disk Scheduling Algorithm?
38)
Explain in
detail all the Disk Scheduling Algorithms?
39)
Explain all the
different Allocation Methods?
40)
Explain Page
Replacement? Also, explain the Page Replacement Algorithms?
41)
What is
Segmentation? Explain the Implementation of Segment Tables?
42)
Describe the
actions taken by thread library to context switch between user level threads?
43)
On a system
with paging, a process cannot access memory that it does not own; why? How
could the operating system allow access to other memory? Why should it or
should it not?
44)
Give a
non-computer example of preemptive and non-preemptive scheduling.
45)
What are the
different tasks of Lexical analysis?
46)
Differentiate
between Complier and Interpreter?
47)
Explain briefly
about, processor, assembler, compiler, loader, linker and the functions
executed by them.
48)
What are the
different functions of Syntax phase, Sheduler?
49)
What are the
main difference between Micro-Controller and Micro- Processor?
50)
Which is the
best page replacement algorithm and Why? How much time is spent usually in each
phases and why?
Submitted
By Gurbinder Sharma
No comments:
Post a Comment