0% found this document useful (0 votes)
116 views3 pages

Operating System

Operating system notes in detail with pyqs

Uploaded by

Rohit Chaudhary
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
116 views3 pages

Operating System

Operating system notes in detail with pyqs

Uploaded by

Rohit Chaudhary
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Roll No, t ayso1| Total No.

, of lages 03
Total No, of Questions : 07
BCA (Sem-4)
OPERATING SYSTEMS
Subject Code :UGCA-1923
M.Code : 79727
Date of Examinatlon: 02-06-2023
Time : 3 Hrs, Max, Marks : 60

INSTRUCTIONS TO CANDIDATES:
SECTION-A ls COMPULSORY conslating of TEN quoatlons carrying Tw0 marks
each.
2 SECTION-B contalns SIX questions carrying TEN marke each and sludonts have
to attempt any FOUR questions.

SECTION-A

1. Write Briely :
A. List and explain the functions and services of an operating system.

Jb. Defend timesharing difter fhom multiprogramning?


Explain process states with state transition diagram. Also explain PCB with a ncat
diagram.
vd. What are the uses of job queues,ready queues and device queues?

Vé. Discuss the difference between symmetric and asymmetric multiprocessing


. Distinguish between hard real time systems and sot real time systems.

Can traps be generated intentionally by a user program? If so, for what purpose?
: What are the five major activities of an operating system with regard to process
management?

What are the three major activities of an operating system with regard to memory
managemcnt?

K What is distributed operating system? Explain its characteristics and architecture.

1|M-79727 (S3)-1904
SECTION-B

Consider the following set of process arrival time and burst time, larger priority number
has a higher priority.
Jobs Arrival Time ms Burst Time ms Priority
6 4
3
J3 3 3 6
J4
5

Draw the Gantt chart circulate waiting time and turnaround time
using :
a) FCFS

b) Preemptive priority
scheduling algorithm.
3
Consider the methods used
whenever needed, as given below.processes P1 and P2 for accessing their critical sections
The initial values of shared Boolean variables SI and
S2 are randomly
assigned.
Method used by P, Method used by P2
While (S, ==S); While (S, != S2);
Critical Section Critical Section
S- S, S==!S,
Explain by taking different values of S, and S,
represented by mutual exclusion and not progress. that above mentioned properties are
4 Consider a reference string: 4,7,6, 1, 7, 6, 1,2, 7, 2. The number of
is 3. Find out the number of page faults frames in the memory
respective to:
a) Optimal Page Replacement Algorithm

b) FIFO Page Replacement Algorithm

c) LRU Page Replacement Algorithm.

A certain computer systen has the segmented paging


architecture for virtual memory.
The memory is byte addressable. Both virtual and physical address spaces
bytes each. The virtual address space is divided into 8 contain 216
non-overlapping
segments. The Memory Management Unit (MMU) has a hardware segment table, each
equal size
entry of which contains the physical address of the page table for the segment. Page
tables are stored in the main memory and consists of 2 byte page table entries. What is
the minimum page size in bytes so that the page table for a segment requires at most one
page to store it?

2| M-79727 (S3)-1904
What is Remote File System (RES) in File
RS. What is the maximum length of the Management? Explain Client-Server Model in
does not support more than one flename in DOS? Name operating system tha
program at a timne.
. Define a Distributed System. Mention a few real time examples of distributed systems.
What are the models that are followed in distributed systems? List the characteristics of a
distributed system. Mention the advantages of a distributed computing environment over
Standalone applications. What is the security mechanisms used in distributed computing?

You might also like