OSY CT1 Qbans
OSY CT1 Qbans
1) Define real time operating system. List its any four applications of it.
In a real-time operating system each job has well defined fixed time constraints which
need to be maintained otherwise the system will fail.
The time taken by the system to respond to an input and provide the output or display
the
updated information is known as the response time. So, in these systems, the response
time should be very minimum. The system should complete the task within the deadline.
Hard Real-Time: Hard real-time refers to tasks or processes that have strict and critical
timing requirements. These tasks must be completed within a specific deadline;
otherwise, it can lead to system failure or dangerous consequences.
Soft Real-Time: Soft real-time refers to tasks or processes that have timing requirements,
but they are not as strict as hard real-time tasks. In soft real-time systems, missing
occasional deadlines may not have catastrophic consequences, but it can degrade
system performance or user experience.
Applications:
• Air traffic control systems
• Railway signaling systems
• Nuclear reactor control systems
• Aerospace and Missile Defense systems
• Medical devices
• Telecommunications
Disadvantages
3) Compare between command line and Graphical user interface.
(Any four points)
The programmers leave their programs with the operator and the operator
then sorts the programs with similar requirements into batches.
6) With the help of diagram describe Multiprocessor operating system.
OR
6) State and describe any two advantages of multiprocessor system
Unit 2:- Services and components of Operating System ( C22516.b)
• Create and delete file:-We first need to create and delete files.
• Open and close :- Once the file is created, we need to open it and to use it.
Finally, we need to close the file, indicating that we are no longer using it.
• Read,Write,Reposition:- Read and write operations perform read and write
operations on a file .By using Reposition a pointer may be set at starting position
or can be repositioned anywhere in a file.
• Get and Set file attributes:- When any file created or in use much more
information gets attached to file by OS like file name,acess rights,protection
code,date and time,accounting information.Thus thesesystem calls used to set
and get file attributes. We may need these same sets of operations for directories
if we have a directory structure for organizing files in the file system. In addition,
for either files or directories, we need to be able to determine the values of
various attributes and perhaps to reset them if necessary. File attributes include
the file name, a file type, protection codes, accounting information, and so on
open(): The open() system call is used to open a file or create a new
file if it doesn't exist. It provides access to the file system and returns
a file descriptor, which is a unique identifier for the opened file. The
open() system call allows specifying various flags and permissions
related to file access.
read(): The read() system call is used to read data from a file or a file-
like resource. It takes a file descriptor, a buffer, and the number of
bytes to read as parameters. The read() system call allows applications
to retrieve data from files, input devices, or other sources of input.
write(): The write() system call is used to write data to a file or a file-
like resource. It takes a file descriptor, a buffer containing the data to
be written, and the number of bytes to write as parameters. The
write() system call allows applications to send data to files, output
devices, or other destinations.
Computer Management
Computer management option can be found within the control
panel of any computer system. One may go to the control panel
from the start menu.
On the computer management window, one may find there are
three panes. The left pane will show some functions, and when
one chooses a function from the left pane, the details of the
pane will be available at the pane at the centre, where as the
right section will show the series of action that can be taken.
There is Task Scheduler within the system tools, and even the
windows event
viewer can be also accessed from the computer management list.
One can
also start defragmentation of the disk and disk spaces from here. And
in the
performance sector, one can see how the system is performing and
that can
be observed for a long period also.
D
OR
5) Describe with example, use of following tools:
i) Device Management
• Description: Device Management tools are used to manage and configure
hardware devices on a computer. These tools help you install, update,
troubleshoot, and monitor the status of hardware components such as graphics
cards, network adapters, and storage devices.
• Example: In Windows, you can access Device Manager to update device drivers,
disable or enable devices, and check for hardware-related issues. For instance, if
your graphics card is not functioning correctly, you can open Device Manager to
update the graphics card driver or disable and re-enable the device to resolve
potential driver conflicts.
One-to-One Model:
• Description: Each user-level thread maps to a separate kernel-level
thread, allowing for true parallelism.
• Advantages:
• Enhanced Parallelism: True parallelism with the ability to fully
utilize multi-core processors.
• Independent Blocking: If one thread blocks, others can
continue.
• Disadvantages:
• High Overhead: Creating and managing many kernel-level
threads can be resource-intensive.
• Limited Scalability: Can be inefficient when managing a large
number of threads.
Many-to-Many Model:
• Description: A hybrid model where many user-level threads are
mapped to a smaller or equal number of kernel-level threads,
providing a balance between parallelism and efficiency.
• Advantages:
• Scalability: Provides a balance between parallelism and resource
management.
• Efficient: Can efficiently utilize both user-level and kernel-level
threads.
• Disadvantages:
• Complexity: More complex to implement than the other
models.
• Performance Overhead: Managing the mapping between user
and kernel threads adds some overhead.
The "exit" command is used to exit the current shell or terminal session. When we
run this command, it typically terminates the shell session, and we will be
returned to the parent shell or terminal.
Message-Passing Model:
In the message-passing model, processes communicate by sending and
receiving messages. These messages can be simple data structures or more
complex packets of information. Here's a description of the key
components of the message-passing model:
• Read and Write: Processes can read and write data directly to and
from the shared memory segment. This allows for fast data exchange.
OR
Error Isolation Errors in one process can Errors are often isolated to
potentially affect data integrity individual processes, reducing
across all processes sharing the the risk of widespread data
memory. corruption.