0% found this document useful (0 votes)
91 views

Operating System Question Bank

Uploaded by

Shivraj Patil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
91 views

Operating System Question Bank

Uploaded by

Shivraj Patil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 21

Operating system question bank.

UNIT 1:
Q.1 What is operating system? Define.
 It is the program that, after it is added to the than it manages all of the other
application programs in a computer.
 The application programs make use of the operating system by making requests
for services through a defined application program interface (API).
 users can interact directly with the operating system through a user interface, such
as a command-line interface (CLI) or a graphical UI (GUI).

Q.2 what is the need of an operating system?


 It brings powerful benefits to computer software and software development.
 Without an OS, every application would need to include its own UI, as well as the
comprehensive code needed to handle the functionality.
 reduces the amount of time and coding required to develop and debug an application,
while ensuring that users can control, configure and manage the system hardware
through a common and well-understood interface.

Q.3 what are the different components of operating system?


1. Process Management
2. I/O Device Management
3. File Management
4. Network Management
5. Main Memory Management
6. Secondary Storage Management
7. Security Management
8. Command Interpreter System

Q.4 Explain in detail different components of operating system.


1. Process Management:
 process is program that is loaded in main memory.
 A process needs certain resources including CPU time, Memory, Files, and I/O
devices to accomplish its task.
 The process management component manages the multiple processes running
simultaneously on the Operating System.
2. I/O Device Management:
 One of the purposes of an operating system is to hide the features of specific hardware
devices from the user.
 I/O Device Management provides an abstract level of H/W devices and keep the
details from applications to ensure proper use of devices, to prevent errors, and to
provide users with convenient and efficient programming environment.
3. File Management:
 File management is one of the most visible services of an operating system.
 Computers can store information in several different physical forms like, magnetic
tape, disk, and drum are the most common forms.

4. Network Management:
 network management involves several different components.
 Network management is the process of managing and administering a computer
network.
 Network management comprises fault analysis, maintaining the quality of service,
provisioning of networks, and performance management.

5. Main Memory Management:


 Main memory is a volatile storage device which means it loses its contents in the
case of system failure or as soon as system power goes down.
 The main motivation behind Memory Management is to maximize memory
utilization on the computer system.
6. Secondary Storage Management:
 The main purpose of a computer system is to execute programs.
 the main memory is too small to permanently accommodate all data and program,
the computer system must provide secondary storage to backup main memory.
 Most modern he operating system is responsible for disk management:
 Free space management
 Storage allocation
 Disk scheduling computer systems use disks.

7. Security Management:
 The various processes in an operating system must be protected from each
other’s activities.
 Security Management refers to a mechanism for controlling the access of
programs, processes, or users to the resources defined by a computer controls
to be imposed, together with some means of enforcement.

8. Command Interpreter System:


 One of the most important component of an operating system is its command
interpreter.
 Command Interpreter System allows human users to interact with the Operating
System and provides convenient programming environment to the users.

Q.5 what are the different operations of operating system? Explain.


1.Security –
 OS uses password protection to protect user data and similar other techniques.
 OS also prevents unauthorized access to programs and user data.
2.Control over system performance –
 OS Monitors overall system health to help improve performance.
 OS records the response time between service requests and system response to having
a complete view of the system health. This can help improve performance.
3.Job accounting –
 OS Keeps track of time and resources used by various tasks and users, this
information can be used to track resource usage for a particular user or group of users.
4.Error detecting aids –
 OS constantly monitors the system to detect errors and avoid the malfunctioning of a
computer system.
5.Coordination between other software and users –
 OS also coordinate and assign interpreters, compilers, assemblers, and other software
to the various users of the computer systems.
6.Memory Management –
 OS system manages the Primary Memory or Main Memory. Main memory is made up
of a large array of bytes or words where each byte or word is assigned a certain
address.
 OS keeps track of primary memory.
 It Allocates the memory to a process when the process requests it and deallocates the
memory when the process has terminated or is performing an I/O operation.
7.Processor Management –
 OS decides the order in which processes have access to the processor, and how much
processing time each process has. This function of OS is called process scheduling.
 Keeps track of the status of processes. The program which performs this task is
known as a traffic controller.
 Allocates the CPU that is a processor to a process.
8.Device Management –
 An OS manages device communication via their respective drivers.
 Decides which process gets access to a certain device and for how long. Allocates
devices in an effective and efficient way.
 Deallocates devices when they are no longer required.

9.File Management –
 A file system is organized into directories for efficient or easy navigation and usage.
 These directories may contain other directories and other files.
 It keeps track of where information is stored, user access settings and status of every
file, and more… These facilities are collectively known as the file system.

Q6 explain dual mode operations in operating system.


 Dual Mode in OS is the switching of modes between the two modes and switching of
mode by the OS for computation of process by system.
 Dual Mode is responsible for the management of processes and avoiding any system
crashes
User Mode −
 The OS mode in which all the user applications and programs will run.
 Here, the user instructions are worked on and softwares like playing music is run.
Kernel Mode −
 The OS mode in which the hardware loads and its computations are performed.
 Only privileged instructions are allowed to run in kernel mode. Some common
privileged instructions like:
o Input-Output Management.
o Switching modes between user mode and kernel mode.
o Interrupt management.

Q.7 explain program management of the operating system.


 Program management is the process of managing programs mapped to business
objectives that improve organizational performance.
 Program managers oversee and coordinate the various projects and other strategic
initiatives throughout an organization.
 Program managers also help to drive organizational change by helping with agile
transformations, including helping to implement DevOps practices and principles.

Q.8 what are the different activities carried out in process management?

 The creation and deletion of both user and system processes.


 The suspension and resumption of processes.
 The provision of mechanisms for process synchronization.
 The provision of mechanisms for process communication.
 The provision of mechanisms for deadlock handling.

Q.9 explain the events responsible for creation of process.

 Events:
o User request for process creation
o System Initialization
o Batch job initialization
o Execution of a process creation system call by a running process
 A process may be created by another process using fork().
 The creating process is called the parent process and the created process is the child
process. A child process can have only one parent but a parent process may have
many children.
 Both the parent and child processes have the same memory image, open files and
environment strings.
 However, they have distinct address spaces.

Q.10 What are the different resources in computer system?

 Memory
 Processes
 Files
 Security
 CPU Scheduling
 Devices, Device I/O
 Interrupts
 Networks
 DNS

Q.11 Explain resource management of the operating system.

 An operating system (OS) is basically a collection of software that manages computer


hardware resources and provides common services for computer programs.
 The operating system is a crucial component of the system software in a computer
system.
 These are some few common services provided by an operating system −

o Program execution
o I/O operations
o File System manipulation
o Communication
o Error Detection
o Resource Allocation
o Protection
 In the matter of multi-user or multi-tasking environments, resources such as main
memory, CPU cycles and files storage are to be allocated to each user or job.
 Some major activities of an OS with respect to resource management are −
o The Operating System manages all kinds of resources using schedulers.
o CPU scheduling algorithms are employed for better utilization of CPU.

0.12 What is security and its goals? Explain.

 It refers to practices and measures that can ensure the confidentiality, integrity, and
availability (CIA) of operating systems.
 The goal of OS security is to protect the OS from various threats, including malicious
software such as worms, trojans and other viruses, misconfigurations, and remote
intrusions.
 it typically involves the implementation of control techniques that can protect your
assets from unauthorized modification and deletion or theft.
 The most common techniques used to protect operating systems include the use of
antivirus software and other endpoint protection measures, regular OS patch updates,
a firewall for monitoring network traffic, and enforcement of secure access through
least privileges and user controls.

Q.13 What is protection? What are the goals of protection?

 Protection refers to a mechanism which controls the access of programs, processes, or


users to the resources defined by a computer system.
 We can take protection as a helper to multi programming operating system, so that
many users might safely share a common logical name space such as directory or
files.
 Goals:
 protection is a method of safeguarding data and processes against malicious and
intentional intrusion.
 we have protection policies that are either designed by the system itself or specified
by the management itself or are imposed by the programmers individually to protect
their programs with extra safety.
 It also gives a multiprogramming OS the sense of safety that is required by its users to
share common space like files or directories.
 The policies bind how the processes are to access the resources present in the
computer system, resources like CPU, memory, software and even the OS. Both the
OS designer and the application programmer are responsible for this. However, these
policies always change from time to time.

Q.14 Write short note on timer.

 A timer is a software program or hardware device that keeps track of the elapsed time
between two events.
 A timer may also measure a specified amount of time, and signal the user when the
"time is up."
 Uses of a timer include measuring the elapsed time between the start and end of a
computer program, or the elapsed time between two mouse button clicks.

Q. 15 Explain trojan horses and trap doors.

1. Trojan Horse:

 A standalone malicious program that may give full control of an infected PC to


another PC is called a Trojan horse.
 This is actually a code segment that tries to misuse its own environment.
 They somehow look attractive but on the other hand, they are really harmful and they
actually serve as virus carriers.
 It may make copies of them, harm the host computer systems, or steal information.
 The Trojan horse will actually do damage once installed or run on your computer but
at first, a glance will appear to be useful software.
 Trojans are designed as they can cause serious damage by deleting files and
destroying information on your system.
 Trojans allow confidential or personal information to be compromised by the system
creating a backdoor on your computer that gives unauthorized users access to your
system.
 Unlike Trojans do not self-replicate or reproduce by infecting other files nor do they
self-replicate which means Trojan horse viruses differ from other computer viruses
and do not spread themselves.
 The most popular Trojan horses are Beast, Zeus, The Blackhole Exploit Kit,
Flashback Trojan, Netbus, Subseven, Y3K Remote Administration Tool, and Back
Orifice.

2.Trap Door:

 A trap door is kind of a secret entry point into a program that allows anyone to gain
access to any system without going through the usual security access procedures.
 Another definition of a trap door is it is a method of bypassing normal authentication
methods. Therefore it is also known as a back door.
 Trap Doors are quite difficult to detect and also in order to find them the programmers
or the developers have to go through the components of the system.
 Programmers use Trap door legally to debug and test programs.
 Program development and software update activities should be the first focus of
security measures. The operating system that controls the trap doors is difficult to
implement.

Q.16 Explain protection domains with help of example.


 The protection policies limit the access of each process with respect to their resource
handling.
 A process is bound to use only those resources which it requires to complete its task,
in the time limit that it requires and also the mode in which it is required.
 A computer system has processes and objects, which are treated as abstract data types,
and these objects have operations specific to them.
 A domain element is described as <object, {set of operations on object}>.
 Each domain consists of a set of objects and the operations that can be performed on
them. A domain can consist of either only a process or a procedure or a user.
 Then, if a domain corresponds to a procedure, then changing domain would mean
changing procedure ID.
 Objects may share a common operation or two. Then the domains overlap.
Q.17 What is access matrix? Explain.

 Access Matrix is a security model of protection state in computer system. It is


represented as a matrix.
 Access matrix is used to define the rights of each process executing in the domain
with respect to each object.
 The rows of matrix represent domains and columns represent objects.
 Each cell of matrix represents set of access rights which are given to the processes of
domain means each entry defines the set of operations that a process executing in
domain Di can invoke on object Oj.

Q. 18 What are the different views of operating system? Explain.

 Application view.
 User view.
 System view.
 Implementation view.
o Application view:
 The operating system does not perform any functions on its own, but it provides an
atmosphere in which various apps and programs can do useful work.
 The operating system may be observed from the point of view of the user or the
system, and it is known as the user view and the system view.
o User view:
 The user view depends on the system interface that is used by the users.
 The user viewpoint focuses on how the user interacts with the operating system
through the usage of various application programs.
 the system viewpoint focuses on how the hardware interacts with the operating system
to complete various tasks.
o System view:
 A computer system comprises various sources, such as hardware and software, which
must be managed effectively.
 The operating system manages the resources, decides between competing demands,
controls the program execution, etc.
 According to this point of view, the operating system's purpose is to maximize
performance.
o Implementation view:
 Operating system by itself does not provide any function but it provides an
atmosphere in which different applications and programs can do useful work.
 There are many problems that can occur while designing and implementing an
operating system.
 These are covered in operating system design and implementation.

Q.19 Explain user's view and system view of operating system.

 The user view depends on the system interface that is used by the users.
 The user view focuses on how the user interacts with the operating system through the
usage of various application programs.
 the system viewpoint focuses on how the hardware interacts with the operating system
to complete various tasks.
 Types: 1.single user view point, 2.multiple user view point, 3.handled user view point,
4.embedded user view point.

Q.20 What are the different types of operating systems?

 Batch operating systems.


 Time-sharing or multitasking operating systems.
 Distributed operating systems.
 Network operating systems.
 Real-time operating systems.
 Mobile operating systems.

Q.21 Explain batch operating systems.

 It does not have a direct link with the computer.


 A different system divides and allocates similar tasks into batches for easy processing
and faster response.
 It is appropriate for lengthy and time-consuming tasks.
 To avoid slowing down a device, each user prepares their tasks offline and submits
them to an operator.
 Advantages:
o Many users can share batch systems.
o There is little idle time for batch operating systems.
o It becomes possible to manage large workloads.
o It's easy to estimate how long a task will take to be completed.
 disadvantage:
o Batch operating systems are challenging to debug
o Any failure of the system creates a backlog.
o It may be costly to install and maintain good batch operating systems.

Q.22 Explain Multiprogrammed Operating Systems.

 Multiprogramming OS is an ability of an operating system that executes more than


one program using a single processor machine.
 More than one task or program or jobs are present inside the main memory at one
point of time.
 Advantages
o CPU utilization is high because the CPU is never goes to idle state.
o Memory utilization is efficient.
o CPU throughput is high and also supports multiple interactive user terminals.
 Disadvantages
o CPU scheduling is compulsory because lots of jobs are ready to run on CPU
simultaneously.
o User is not able to interact with jobs when it is executing.
o Programmers also cannot modify a program that is being executed.

Q.23 Explain Time Shared Operating Systems.

 Time-Sharing Operating Systems is one of the important type of operating system.


 Time-sharing enables many people, located at various terminals, to use a particular
computer system at the same time.
 Multitasking or Time-Sharing Systems is a logical extension of multiprogramming.
 Advantages It provides the advantage of quick response.
o This type of operating system avoids duplication of software.
o It reduces CPU idle time.
 Disadvantages
o Time sharing has problem of reliability.
o Question of security and integrity of user programs and data can be raised.
o Problem of data communication occurs.

Q.24 Explain Multiprocessor systems.

 Multiprocessor system means, there are more than one processor which work parallel
to perform the required operations.
 It allows the multiple processors, and they are connected with physical memory,
computer buses, clocks, and peripheral devices.
 The best Operating system in multiprocessor and parallel computing environment is
UNIX, because it has many advantages
o It is multi-user.
o It is portable.
o It is good for multitasking.
o It has an organized file system.
o It has device independence.
o Utilities are brief and operation commands can be combined in a single line.
o Unix provides various services, as it has built-in administrative tools,
o UNIX can share files over electronic networks with many various kinds of equipment.
Q.25 Explain mainframe operating systems.

 In simplest terms, an OS is a collection of programs that manage a computer system's


internal workings— its memory, processors, devices, and file system.
 Mainframe OS are sophisticated products with substantially different characteristics
and purposes.
 OS are designed to make the best use of the computer's various resources, and ensure
that the maximum amount of work is processed as efficiently as possible.
 Although an operating system cannot increase the speed of a computer, it can
maximize use of resources, thereby making the computer seem faster by allowing it to
do more work in a given period of time.

Q.26 What is distributed systems? Explain.

 A distributed system is a computing environment in which various components are


spread across multiple computers on a network.
 These devices split up the work, coordinating their efforts to complete the job more
efficiently than if a single device had been responsible for the task.
 Distributed systems are an important development for IT and computer science as an
increasing number of related jobs are so massive and complex that it would be
impossible for a single computer to handle them alone.
 But distributed computing offers additional advantages over traditional computing
environments.

Q.27 Explain distributed operating system.

 A distributed operating system (DOS) is an essential type of operating system.


 Distributed systems use many central processors to serve multiple real-time
applications and users.
 As a result, data processing jobs are distributed between the processors.
 It connects multiple computers via a single communication channel.
Furthermore, each of these systems has its own processor and memory.
Additionally, these CPUs communicate via high-speed buses or telephone lines.
 Types of Distributed Operating System:
o Client-Server Systems
o Peer-to-Peer Systems
o Middleware
o Three-tier
o N-tier

Q.28 Explain network operating system.

 A network operating system is a computer OS that is designed primarily to support


workstations, personal computers and, in some instances, older terminals that are
connected on a LAN.
 The software behind a NOS allows multiple devices within a network to communicate
and share resources with each other.
 NOS includes a number of personal computers, a printer, a server and file server with
a local network that connects them together.
 Types of network operating systems:
o Peer-to-peer network operating system
o Client/server network operating system

Q.29 Differentiate between distributed operating system and network operating system.

S.NONetwork Operating System Distributed Operating System

It’s main objective is to provide the It’s main objective is to manage the hardware
1. local services to remote client. resources.

In NOS Communication takes place on In DOS Communication takes place on the


2. the basis of files. basis of messages and shared memory.

NOS is more scalable than Distributed DOS is less scalable than Network Operating
3. Operating System. System.

4. In NOS, fault tolerance is less. While in DOS, fault tolerance is high.

5. Rate of autonomy in NOS is high. While The rate of autonomy in DOS is less.

Ease of implementation in NOS is also


6. high. While in DOS Ease of implementation is less.

Q.30 What is real time systems? Explain in detail.

 A real-time system means that the system is subjected to real-time, the


response should be guaranteed within a specified timing constraint or the
system should meet the specified deadline.
 For example flight control systems, real-time monitors, etc.
 Types of real-time systems based on timing constraints:
 Hard real-time system:
o This type of system can never miss its deadline.
o Missing the deadline may have disastrous consequences.
o Example: Flight controller system.
 Soft real-time system:
o This type of system can miss its deadline occasionally with some acceptably low
probability.
o Missing the deadline have no disastrous consequences.
o Example: Telephone switches.

Q.31 What is mobile OS? Explain.

 A mobile operating system is an operating system that helps to run other application
software on mobile devices.
 It is the same kind of software as the famous computer operating systems like Linux
and Windows, but now they are light and simple to some extent.
 The operating systems found on smartphones include Symbian OS, iPhone OS, RIM's
BlackBerry, Windows Mobile, Palm WebOS, Android, and Maemo.
 It combines the beauty of computer and hand use devices.
 It typically contains a cellular built-in modem and SIM tray for telephony and internet
connections.
 If you buy a mobile, the manufacturer company chooses the OS for that specific
device.

Q.32 Explain Android operating system.

 The Android operating system was developed by Google (GOOGL) for use in all of
its touchscreen devices, tablets, and cell phones.
 This operating system was first developed by Android Inc., a software company
located in Silicon Valley before it was acquired by Google in 2005.
 While the Android source code is released in an open-source format to help advance
open standards across mobile devices, it is still packaged with proprietary software
when sold on handset devices.

Q.33 What are design goals of android OS?

 User Design Requirements:


 The operating system should be convenient, easy to use, reliable, safe and fast
according to the users.
 However, these specifications are not very useful as there is no set method to achieve
these goals.
 System Design Requirements:
 The operating system should be easy to design, implement and maintain.
 These are specifications required by those who create, maintain and operate the
operating system.
 But there is no specific method to achieve these goals as well.

Q.34 Explain architecture of android OS.

 Android software contains an open-source Linux Kernel having collection of number


of C/C++ libraries which are exposed through an application framework services.
 The main components of android architecture are following:-
 Applications:
o The pre-installed applications like home, contacts, camera, gallery etc and third party
applications downloaded from the play store like chat applications, games etc. will be
installed on this layer only.
 Application Framework:
o Application Framework provides several important classes which are used to create
an Android application.
 Android Runtime:
o Android Runtime environment is one of the most important part of Android.
o it provides the base for the application framework and powers our application with the
help of the core libraries.
 Platform Libraries:
o The Platform Libraries includes various C/C++ core libraries and Java based libraries
such as Media, Graphics, Surface Manager, OpenGL etc. to provide a support for
android development.
 Linux Kernel
o Linux Kernel is heart of the android architecture.
o It manages all the available drivers such as display drivers, camera drivers, Bluetooth
drivers, audio drivers, memory drivers, etc. which are required during the runtime.

Q.35 Explain IOS?

 IOS is a mobile operating system for Apple-manufactured devices. iOS runs on the
iPhone, iPad, iPod Touch and Apple TV.
 iOS is best known for serving as the underlying software that allows iPhone users to
interact with their phones using gestures such as swiping, tapping and pinching.
 These finger actions are typically performed on multitouch capacitive touch screen
displays, which provide fast response and accept inputs from multiple fingers.
 Although it is not the No. 1 mobile OS globally, iOS dominates the North American
market by a large margin, with a 60 percent market share as of May 2010.

Q.36 Difference between Time sharing System and Real Time System.

S.NO Time Sharing Operating System Real-Time Operating System

While in real time operating system,


In time sharing operating system, quick computation tasks are emphasized before its
1. response is emphasized for a request. nominative point.

In this operating While in this operating


system Switching method/function is system Switching method/function is not
2. available. available.

In this operating system any modification While in this modification does not take
3. in the program can be possible. place.

In this OS, computer resources are shared But in this OS, computer resources are not
4. to the external. shared to the external.

It deals with more than processes or Whereas it deals with only one process or
5. applications simultaneously. application at a time.

In this OS, the response is provided to While in real time OS, the response is
6. the user within a second. provided to the user within time constraint.
Q.37 Difference between Multiprogramming and Multitasking.

Sr.no  Multiprogramming  Multi-tasking 

Both of these concepts are for single


1.  CPU.  Both of these concepts are for single CPU. 

Concept of Context Switching and Time


2. Concept of Context Switching is used. Sharing is used.

The processor is typically used in time


In multiprogrammed system, the sharing mode. Switching happens when
operating system simply switches to, either allowed time expires or where there
and executes, another job when other reason for current process needs to wait
3. current job needs to wait.  (example process needs to do IO).

Multi-programming increases CPU In multi-tasking also increases CPU


4. utilization by organising jobs . utilization, it also increases responsiveness.

The idea is to further extend the CPU


The idea is to reduce the CPU idle Utilization concept by increasing
5. time for as long as possible. responsiveness Time Sharing.

Q.38 Write short note on disk operating system.

 MS-DOS is one of the oldest and widely used operating system.


 DOS is a set of computer programs, the major functions of which are file
management, allocation of system resources, providing essential features to control
hardware devices.
 DOS commands can be typed in either upper case or lower case.

Q.39 Explain features of disk operating system.

 It is a single user system.


 It controls program.
 It is machine independence.
 It manages (computer) files.
 It manages input and output system.
 It manages (computer) memory.
 It provides command processing facilities.
 It operates with Assembler.

Q.40 Explain directory structure of disk operating system.


Q.41 Explain file structure of disk operating system.

 files are divided into various logical blocks.


 Files are to be stored in the hard disk and to be retrieved from the hard disk.
 Hard disk is divided into various tracks and sectors.
 Therefore, in order to store and retrieve the files, the logical blocks need to be mapped
to physical blocks. This mapping is done by File organization module.
 It is also responsible for free space management.
 Once File organization module decided which physical block the application program
needs, it passes this information to basic file system.

Q.42 What are Internal and External Commands in DOS?

 In MS-DOS, there are two ways commands are executed: internally and externally.
 An internal command is embedded into the COMMAND.COM file, and an external
command is not and requires a separate file to operate.

Q.43 Explain history of UNIX in short.

 UNIX development was started in 1969 at Bell Laboratories in New Jersey.


 Bell Laboratories was (1964–1968) involved on the development of a multi-user,
time-sharing operating system called Multics (Multiplexed Information and
Computing System). Multics was a failure.
 In early 1969, Bell Labs withdrew from the Multics project.
 Unix was created in the late 1960s, in an effort to provide a multiuser, multitasking
system for use by programmers.
 The philosophy behind the design of Unix was to provide simple, yet powerful
utilities that could be pieced together in a flexible manner to perform a wide variety of
tasks.

Q44 What are the goals of UNIX OS?

1.Primary Goal:

 The primary goal of an Operating System is to provide a user-friendly and convenient


environment.
 We know that it is not compulsory to use the Operating System, but things become
harder when the user has to perform all the process scheduling and converting the user
code into machine code is also very difficult. So, we make the use of an Operating
System to act as an intermediate between us and the hardware.
 All you need to do is give commands to the Operating System and the Operating
System will do the rest for you. So, the Operating System should be convenient to
use.

2.Secondary Goal:
 The secondary goal of an Operating System is efficiency.
 The Operating System should perform all the management of resources in such a way
that the resources are fully utilised and no resource should be held idle if some request
to that resource is there at that instant of time.

Q.45 Explain interfaces to UNIX OS.

 UNIX systems also have a graphical user interface (GUI) similar to Microsoft
Windows which provides an easy to use environment.
 However, knowledge of UNIX is required for operations which aren't covered by a
graphical program, or for when there is no windows interface available, for example,
in a telnet session.

Q.46 Explain UNIX shell and utility programs.

 UNIX Shell is a collection of computer operating systems that allow multiple users to
do multiple tasks.
 A shell is a medium provided to interact with the kernel, which is a Command Line
Interface (CLI) to the Unix system.
 It is basically a command-line interface to the Unix system.
 It works by gathering the input from the users, executing the program based on the
input from the users, and then displaying the output after the program’s execution.

Q.47 Explain Information, File, Process/Memory Management in UNIX.

Q.48 Explain history of Windows OS.

 The history of Windows dates back to 1981 when Microsoft started work on a
program called "Interface Manager".
 It was announced in November 1983 (after the Apple Lisa, but before the Macintosh)
under the name "Windows", but Windows 1.0 was not released until November 1985.

Q.49 What are Microsoft's design goals for Windows OS? Explain.

 Provide a true 32-bit, preemptive, reentrant, virtual memory operating system


 Run on multiple hardware architectures and platforms
 Run and scale well on symmetric multiprocessing systems
 Be a great distributed computing platform, both as a network client and as a server
 Run most existing 16-bit MS-DOS and Microsoft Windows 3.1 applications
 Meet government requirements for POSIX 1003.1 compliance
 Meet government and industry requirements for operating system security
 Be easily adaptable to the global market by supporting Unicode
 Q.50 Explain different system components of Windows OS.
The main components of the Windows Operating System are the following:

 Configuration and maintenance


o Application and package deployments
o Software update deployments
o Compliance settings deployment and evaluation
o OS and custom task sequence deployments are the tasks performed by configuration
and maintenance.
 User interface
o Windows Forms is a graphical application programming interface for creating
managed Windows applications that are based on the .NET Framework.
o In Windows Forms, a form is a visual surface on which you display
information to the user, and through which you receive input from the user.
 Applications and utilities
o Everyone can use applications and utilities to make their job easier likeQuicklook,
Networkx, Lightshot, ShareXDropboxRemote Mouse, Everything, Rainmeter,
Remote Fingerprint Unlock, DeskDock

Q.51 Explain history of Linux OS.

 In 1991, Linus Torvalds a student at the university of Helsinki, Finland, thought to


have a freely available academic version of Unix started writing its own code.
 Later this project became the Linux kernel. He wrote this program specially for his
own PC as he wanted to use Unix 386 Intel computer but couldn't afford it.
 He started it just for fun but ended up with such a large project. Firstly he wanted to
name it as 'Freax' but later it became 'Linux'.
 He published the Linux kernel under his own license and was restricted to use as
commercially in 1992.

Q.52 Explain features of Linux OS.

1. Portable Environment

 Linux software operates flawlessly on a variety of hardware platforms.


 Without the worry of incompatibility, individuals can use Linux operating system on
any device.

2. Free and Open-Source

 Its source code is available for anybody to use and alter.


 Many developers collaborate in organizations to improve and strengthen Linux, and
lots of developers constantly work on updating the Linux system.

3. Shell/ Command-line Interface

 The Linux system includes essential programs that users can utilize in order to issue
commands to the operating system for executing the design flawlessly.

4. End-to-end encryption
 Authentication can help you keep your data protected.
 Before you may access some critical files, the Linux Operating System requires you
to enter a password.

5. Graphical User Interface (GUI)

 Linux Operating System comes with Graphical User Interface (GUI) abilities in the
same way you can with Windows.

6. Configure Keyboards into Different Languages

 Because Linux is available in various languages, it is simple to use it worldwide.


 you can change the language on your keyboard as per your preference.

7. Frequent New Updates

 Software updates are controlled by the users in Linux. Individuals have the option to
pick and choose which updates are required, and there are a plethora of system
updates accessible.

8. Lightweight Infrastructure

 Linux is a highly lightweight operating system.


 Linux has far fewer prerequisites than any other operating system, has a smaller
memory footprint, and uses less storage space.

9. Extremely Flexible

 Linux is highly flexible, and a variety of desktop applications, embedded systems, and
server applications can benefit from the same.

10. Best For Developers

 Linux supports programming language, including C/C++, Java, Python, Ruby, etc.
Furthermore, it provides a wide range of development-related applications.

Q.53 Explain components of Linux OS.

 Kernel –
o Kernel is the core part of Linux.
o It is responsible for all major activities of this operating system.
o It consists of various modules and it interacts directly with the underlying hardware.
o Kernel provides the required abstraction to hide low level hardware details to system
or application programs.

 System Library –
o System libraries are special functions or programs using which application programs
or system utilities accesses Kernel's features.
o These libraries implement most of the functionalities of the operating system and do
not requires kernel module's code access rights.
 System Utility –
o System Utility programs are responsible to do specialized, individual level tasks.

Q.54 Differentiate between MS DOS and Windows.

Sr. Key DOS Windows


No.

Definition DOS stands for Disk Windows stands for Windows, no


1
Operating System. specific form.

Tasking DOS is single tasking Windows is multi-tasking OS.


2
Nature OS.

Memory DOS memory Windows memory requirements are


3 consumption requirements are quite quite high as compared to DOS.
low.

Networking DOS has no support for Windows supports networking.


4
support networking.

User DOS is command line Windows is GUI based OS


5
interface based OS.

Multimedia Multimedia is not Windows supports multimedia likes


6
supported in DOS. games, videos, audios etc.

Q.55 Differentiate between GUI and CUI.

Features CUI GUI

Full-Form CUI stands for Character User GUI stands for Graphical User
Interface. Interface.

Interaction The user interacts with the The user interacts with the system
computer using commands like using Graphics like icons, images.
text.

Navigation Navigation is not easy. Navigation is easy to use.

Usage Usage is easy to use. Usage is difficult, requires expertise.


Speed It has high speed. It has a low speed.

Memory It has a low memory requirement. It has a high memory requirement.


Requirement

Precision It has high precision. It has low precision.

Customize It is not easily changeable. It has highly customizable.

Q.56 What are the advantages of Linux/UNIX over Windows? Explain

 The fact that a majority of the fastest supercomputers of the world that run on Linux
can be attributed to its speed.
 Linux has a reputation for being fast and smooth while Windows 10 is known to
become slow and slow over time.
 Linux runs faster than Windows 8.1 and Windows 10 along with a modern desktop
environment and qualities of the operating system while Windows is slow on older
hardware.
 Talking about the core capabilities of OS like thread scheduling, memory
management, i/o handling, file system management, and core tools, overall Linux is
superior to Windows.

You might also like