Cs8493 Operating Systems Important Questions
Cs8493 Operating Systems Important Questions
Question Bank
II YEAR IT
UNIT I
PART A
Blooms
S.
Question CO Taxanomy
No.
Level
1 What are the objectives of operating system?
(AU: April/May 2010) (AU: May/June 2012)
(April/May 2017)
Ans: An operating system is a program that
manages the computer hardware. it act as an C212.1 BTL-1
intermediate between a users of a computer and the
computer hardware. It controls and coordinates the
use of the hardware among the various application
programs for the various users.
user interaction is
there won’t be any
involved in the
user interactions
processing
PART B
PART – A
S. Blooms
No Question CO Taxanomy
. Level
1 Compare and contrast Single-threaded and
multi-threaded process. (Apr/May 2017)
Ans:Single-threading is the processing of one
command/ process at a time. Whereas multi
threading is a widespread programming and C212.2 BTL-2
execution model that allows multiple threads to exist
within the context of one process. These threads
share the process's resources, but are able to execute
independently.
Kernel threads:-
Kernel threads are supported directly by the
operating system .Thread creation, scheduling and
management are done by the operating system.
Therefore they are slower to Creating & manage
compared to user threads. If the thread performs a
blocking system call, the kernel can schedule
another thread in the application for execution
13 What is the use of fork and exec system calls? C212.2 BTL-1
Ans: Fork is a system call by which a new process is
Creatingd. Exec is also a system call, which is used
after a fork by one of the two processes to place the
process memory space with a new program.
14 Distinguish between user-level threads and
kernel-level threads? Under what circumstances
is one type better than the other?
Ans:
• User-level threads are unknown by the
kernel, whereas the kernel is aware of kernel C212.2 BTL-4
threads.
• User threads are scheduled by the thread
library and the kernel schedules kernel
threads.
• Kernel threads need not be associated with a
process whereas every user thread belongs to
a process.
15 Define thread cancellation and target thread.
Ans:The thread cancellation is the task of
terminating a thread before it has completed. A
thread that is to be cancelled is often referred to as C212.2 BTL-1
the target thread. For example, if multiple threads
are concurrently searching through a database and
one thread returns the result, the remaining threads
might be cancelled.
16 What are the different ways in which a thread
can be cancelled?
Ans:Cancellation of a target thread may occur in
two different scenarios:
Asynchronous cancellation: One thread
immediately terminates the target thread is called C212.2 BTL-1
asynchronous cancellation.
Deferred cancellation: The target thread
can periodically check if it should terminate,
allowing the target thread an opportunity to
terminate itself in an orderly fashion.
•Switching context
•Switching to user mode
•Jumping to the proper location in the user
program to restart that program.
20 What are the various scheduling criteria for CPU
scheduling?
Ans: The various scheduling criteria are,
C212.2 BTL-1
• CPU utilization
• Throughput
• Turnaround time
• Waiting time
• Response time
PART B
1 Suppose that the following processes arrive for
execution at the times indicated. Each process will
run the listed amount of time. In answering the
questions, use non-preemptive scheduling and
base all decisions on the information you have at
the time the decision must be made. (Nov/Dec
2018)
Process Arrival Time Burst Time
P1 0.0 8
C212.2 BTL-
1
P2 0.4 4
PART A
S. Blooms
No Question CO Taxano
. my
Level
1 What is the difference between user-level instructions and
privileged instructions? (April/May 2017)
Ans: A non-privileged (i.e. user-level) instruction is an
instruction that any application or user can execute. A C212.3 BTL-1
privileged instruction, on the other hand, is an instruction that
can only be executed in kernel mode. Instructions are divided in
this manner because privileged instructions could harm the
kernel.
2 Define: Belady’s anomaly? (April/May 2017)
Ans: In computer storage, Bélády's anomaly is the
phenomenon in which increasing the number of page frames
C212.3 BTL-1
results in an increase in the number of page faults for certain
memory access patterns. This phenomenon is commonly
experienced when using the first-in first-out (FIFO) page
replacement algorithm.
3 What is the purpose of paging the page table? (Nov/Dec
2016)
PART A
Blooms
S.
Taxano
No Question CO
my
.
Level
1 Distinguish file from dictionary. (Apr/May2017)
Ans: C212.4 BTL-4
A file is any kind of computer document whereas a directory is a
collection of files and folders.
2 Why it is important to scale up system bus and device speed
as CPU speed increases? (Nov/Dec 2016)
Ans:
Consider a system which performs 50% I/O and 50% computes.
Doubling the CPU performance on this system would increase C212.4 BTL-1
total system performance by only 50%. Doubling both system
aspects would increase performance by 100%. Generally, it is
important to remove the current system bottleneck, and to
increase overall system performance, rather than blindly
increasing the performance of individual system components.
Reading a file
Repositioning within a file
Deleting a file
Truncating a file
Access rights
13 Define Directory.
Ans:
The device directory or simply known as directory records C212.4 BTL-1
information-such as name, location, size, and type for all files on
that particular partition. The directory can be viewed as a symbol
table that translates file names into their directory entries.
14 List the operations that can be performed on a directory. C212.4 BTL-1
Two-level Directory
Tree-Structured
Directories Acyclic-Graph
Directories
General Graph Directory
16 Define UFD and MFD.
Ans:
In the two-level directory structure, each user has her own user
file directory (UFD). Each UFD has a similar structure, but lists C212.4 BTL-1
only the files of a single user. When a job starts the system's
master file directory (MFD) is searched. The MFD is indexed by
the user name or account number, and each entry points to the
UFD for that user.
17 Examine how an index file is used to speed up the access in C212.4 BTL-4
direct-access files?
Ans:
Have an index in memory; the index gives the key and the disk
location of its corresponding record. Scan the index to find the
record you want, and then access it directly.
18 Explain what ISAM is.
Ans:
ISAM is Indexed sequential access method in which the file is C212.4 BTL-5
stored in sorted order. ISAM has a master index file, indicating
in what part of another index file the key you want is; the
secondary index points to the file records. In both cases, a binary
search is used to locate a record.
19 List disadvantages of using a single
directory. Ans:
C212.4 BTL-4
Users have no privacy. Users must be careful in choosing file
names, to avoid names used by others. Users may destroy each
other’s work.
20 List the advantages of two-level directory?
PART B
1 Explain about directory structure? (Apr/May 2015) (Apr/May C212.4 BTL-5
2017)
Refer page no 517 – 526 from text book “Abraham Silberschatz,
Peter Baer Galvin and Greg Gagne, “Operating System
Concepts”, 9th Edition, John Wiley and Sons Inc., 2012”.
2 What are files and explain the access methods for files?
(Apr/May 2017)
C212.4 BTL-1
Refer page no 379 – 382 from text book “Abraham Silberschatz,
Peter Baer Galvin and Greg Gagne, “Operating System
Concepts”, 9th Edition, John Wiley and Sons Inc., 2012”.
3 Explain about kernel I/O subsystem and transforming I/O to
hardware operations. (Apr/May 2017)
Refer page no 592-600 from text book “Abraham C212.4 BTL-5
Silberschatz, Peter Baer Galvin and Greg Gagne, “Operating
System Concepts”, 9th Edition, John Wiley and Sons Inc.,
2012”.
Refer page no 498 – 502 from text book “Abraham Silberschatz, C212.4 BTL-5
Peter Baer Galvin and Greg Gagne, “Operating System
Concepts”, 9th Edition, John Wiley and Sons Inc., 2012”.
UNIT V
PART A
Blooms
S. Taxano
Question CO
No. my
Level
1 What are the features of Linux file system? (Apr/May
2017) Ans:
• Specifying paths C212.5 BTL-1
• Partition, drives/devises and Directories
• Mounting and Unmounting
• Case sensitivity
• File Extensions
• Hidden files
• File System Permissions
2 What is the use of kernel modules in Linux? (Apr/May
2017) Ans:
C212.5 BTL-1
Kernel modules are pieces of code that can be loaded and
unloaded into the kernel upon demand. They extend the
functionality of the kernel without the need to reboot the system.
3 Define the components of LINUX system. (May/June
2016) Ans:
Linux Operating System has primarily three components:
Kernel − Kernel is the core part of Linux. It is responsible for
all major activities of this operating system. It consists of various
modules and it interacts directly with the underlying hardware.
Kernel provides the required abstraction to hide low level
hardware details to system or application programs. C212.5 BTL-1
13 Define: Conflict
Resolution. Ans:
A mechanism that allows different device drivers to, reserve C212.5 BTL-1
hardware resources and to protect those resources from
accidental use by another driver.
Linux provides a ventral conflict resolution mechanism.
18 Define XEN.
Ans:
Xen is a virtual machine monitor (VMM) for x86-compatible C212.5 BTL-1
computers. Xen can securely execute multiple virtual machines,
each running its own OS, on a single physical system with close-
to-native performance. Xen is open source, and is released under
terms of the GNU General Public License.
19 List the advantages of Virtualization.
Ans:
• Better utilization of computer hardware.
• More securable and manageable than one kernel running C212.5 BTL-1
many applications.
• Reduce complexity of hardware.
• Consumes less power and less space.
• Requires less maintenance
Extended life for installed software.
20 Illustrate the key features of VMware server virtualization.
Ans:
• High Availability (HA) C212.5 BTL-2
• Fault Tolerance (FT)
• vMotion
• Storage vMotion
• Distributed Resource Scheduler (DRS)
PART B&C
1 Explain about Linux kernel and virtualization with neat sketch.
(Apr/May 2017) (Nov/Dec 2016)
C212.5 BTL-2
Refer page no 703 – 705 from text book “Abraham Silberschatz,
Peter Baer Galvin and Greg Gagne, “Operating System
Concepts”, 9th Edition, John Wiley and Sons Inc., 2012”.
2 Briefly discuss about the requirements needed to become a
Linux System Administrative. (Apr/May 2015)
Refer text book “Abraham Silberschatz, Peter Baer Galvin and C212.5 BTL-6
Greg Gagne, “Operating System Concepts”, 9th Edition, John
Wiley and Sons Inc., 2012”.
3 Explain about Linux’s Completely-Fair scheduler in detail.
(Nov/Dec 2016)
C212.5 BTL-2
Refer page no 730 – 731 from text book “Abraham Silberschatz,
Peter Baer Galvin and Greg Gagne, “Operating System
Concepts”, 9th Edition, John Wiley and Sons Inc., 2012”.
4 What are the primary goals of conflict-resolution mechanisms
used by the Linux kernel for loading kernel modules?
(May/June 2016)
C212.5 BTL-1
Refer page no 703 – 705 from text book “Abraham Silberschatz,
Peter Baer Galvin and Greg Gagne, “Operating System
Concepts”, 9th Edition, John Wiley and Sons Inc., 2012”.