Questions For NRB 6th IT
Questions For NRB 6th IT
15. Why do we need 2’s Complement Subtraction? Perform the 2’s Complement Subtraction for
the following number.
a. 111112-10102
b. 11012-111112
Operating System:
Long Questions:
1. Discuss the concept of Symmetric Multiprocessing (SMP) and its advantages in enhancing
system performance. Provide examples of scenarios where SMP is particularly beneficial.
4. Compare and contrast the Least Recently Used (LRU) and First-In-First-Out (FIFO) page
replacement algorithms. Discuss scenarios in which one algorithm might outperform the other.
5. Explain the concept of the Belady's anomaly in the context of page replacement algorithms.
How does the phenomenon impact the performance of algorithms such as FIFO and LRU?
6. Discuss the strengths and weaknesses of the Optimal page replacement algorithm. In what
situations is it practical, and what challenges might arise in its implementation?
7. Compare the Clock page replacement algorithm with the Second Chance algorithm. Highlight
their similarities, differences, and scenarios where each algorithm is most effective.
8. Explain the concept of the Working Set Model and its relevance to page replacement
algorithms. How does the Working Set Model help in determining an appropriate page
replacement policy for a given system?
9. Provide a detailed overview of Inter-Process Communication (IPC) mechanisms, including
message passing and shared memory. Discuss the advantages and disadvantages of each
method.
10. Define and discuss the concept of semaphores. Explain how semaphores are used for
synchronization and mutual exclusion. Include a numerical example to illustrate their
application.
1. What is Symmetric Multiprocessing (SMP), and how does it contribute to better utilization of
multiple processors in a system?
2. Explain the concept of Micro-kernels and highlight one advantage and one disadvantage of
using a Micro-kernel architecture.
3. Define Concurrency in the context of processes and threads. How does it differ from
parallelism?
4. What is Mutual Exclusion, and why is it essential in multi-process systems? Provide an example
of a scenario where Mutual Exclusion is crucial.
5. Briefly describe the role of Semaphores in achieving synchronization between processes.
6. Name three features that are important for a process scheduling algorithm. How do these
features impact system performance?
7. List two common features of Inter-Process Communication (IPC) mechanisms. Why is IPC
crucial in modern operating systems?
8. Identify a situation that may lead to a deadlock in a system. How can deadlock prevention
strategies be implemented?
9. Define a Process in the context of operating systems. What are the key features of a Process
Management System?
10. Explain the concept of Virtual Memory Management. How does it enhance the effective
utilization of system memory?
11. Differentiate between Parallel Processing and Distributed Processing. Provide an example
scenario where each is applicable.
12. Identify two security threats to operating systems and briefly explain how authentication and
access authorization address these threats.
13. Describe the organization of I/O devices in a computer system. How does interrupt handling
contribute to efficient I/O operations?
14. Explain the concept of Distributed Message Passing. In what scenarios is this communication
method preferable in distributed systems?
15. Define RPC (Remote Procedure Call) and provide an example of a situation where RPC is
commonly used in distributed systems.
16. Explain the functions of an Operating System with an example.
17. Why Operating system is called resource manager? List out the types of operating system and
explain only two of them.
Long Questions:
1.Provide a detailed explanation of the key concepts introduced in the content section "Introduction to
Databases." Why are databases essential in modern computing?
2.Define and discuss the fundamental principles of a Database Model. How does the Relational
Database Model differ from other database models?
3.Explore the concept of Integrity in the context of databases. How is data integrity maintained in a
Relational Database Management System (RDBMS)?
4.Explain the significance of SQL (Structured Query Language) and Embedded SQL in database
management. How do they contribute to data manipulation and retrieval?
5.Describe the process of writing basic SQL queries, covering Data Definition Language (DDL), Data
Manipulation Language (DML), and Data Control Language (DCL) operations.
6.Discuss the basics of SQL middleware, focusing on SQL API and Open SQL Gateway. How do these
technologies facilitate interaction with databases?
7.Explore the techniques for restricting and sorting data in SQL. Provide examples to illustrate the
application of these techniques in real-world scenarios.
8.Explain the concept of Sub-Queries in SQL. How can sub-queries be used to manipulate data and
create/manage tables?
9.Discuss the process of creating views in a relational database. How are user access controls
implemented, and what is the importance of managing user access?
10.Provide an overview of set operators in SQL. Explain the usage of date-time functions and their
significance in querying and managing temporal data.
11.Define the fundamental concepts of Relational Database Design, including ER Diagrams and various
types of keys (primary, foreign, candidate, alternate keys).
12.Explore the principles of normalization, covering 1NF, 2NF, 3NF, BCNF, and 4NF. Explain the
importance of normalization in database design.
13.Explore the principles of Transaction Management and Concurrency Control. How is concurrent
execution of user programs and transactions managed, and what are the techniques for concurrency
control?
Short Questions: