0% found this document useful (0 votes)
10 views

Operating System

Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

Operating System

Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

What do you know about linux operating system?

Linux is an open-source operating system based on Unix, known for its


stability, security, and flexibility. Developed by Linus Torvalds in 1991, it uses
the Linux kernel and is maintained by a global community of developers.
Linux is highly customizable and supports a wide range of hardware. It is
commonly used for servers, desktops, and embedded systems. Popular
distributions include Ubuntu, Fedora, CentOS, and Debian, each tailored to
different needs. Linux's open-source nature allows users to modify and
distribute their versions. It is also known for strong command-line tools and a
robust security model.

Specify different technique used to handle deadlock in distributed system.


Banker algorithm (Deadlock avoidance )
Deadlock prevention(Deadlock prevention )

In distributed systems, deadlock handling techniques can be broadly


classified into deadlock prevention, deadlock avoidance, deadlock detection,
and deadlock recovery.

Deadlock Prevention:

1. Resource Ordering: Resources are assigned a global order, and


processes request resources in ascending order of enumeration.
2. Pre-allocation: Ensuring all required resources are allocated to a
process before it begins execution.
3. Resource Holding: Prohibiting processes from holding one
resource while requesting additional resources.
4. No Preemption: Resources held by a process can be forcibly
taken away if needed by another process.

Deadlock Avoidance:

1. Banker's Algorithm: Processes declare maximum resource


needs in advance, and the system grants resources only if it
leads to a safe state.
2. Wait-Die and Wound-Wait Schemes: These are priority-based
schemes where older processes either wait for younger
processes (Wait-Die) or preempt younger processes (Wound-
Wait) to avoid deadlocks.

Specify difference between network based and single user operating


system?

A Network-Based Operating System (NOS) manages network resources,


enabling multiple computers to communicate and share resources like files
and printers. It provides centralized user management, network security, and
resource allocation, supporting network services and applications. Examples
include Windows Server and UNIX-based systems.

A Single-User Operating System is designed for one user at a time, managing


resources and tasks on a single computer. It provides a user-friendly interface
for personal use, with basic file management and limited multitasking
capabilities. Examples include early versions of Windows and macOS.

What are the basic Elements of access matrix.

· Subjects: Entities that request access, such as users or processes.


· Objects: Resources or data that are being accessed, like files, directories, or
devices.
· Access Rights: Permissions or operations that subjects can perform on
objects, such as read, write, or execute.
· Access Matrix Table: A matrix or table where rows represent subjects,
columns represent objects, and the entries indicate the access rights granted.

Long Questions

1 Discuss different security threats in detail that may affect the efficiency of
OS.

Malware

1. Viruses: Infect and corrupt files, causing performance issues.


2. Worms: Spread across networks, consuming resources and
bandwidth.
3. Trojans: Disguise as legitimate software, creating backdoors.
4. Ransomware: Encrypts files, demanding ransom, disrupting
access.

Rootkits

1. Conceal their presence, allowing persistent, undetected control,


leading to system instability.

Adware and Spyware

1. Adware: Displays unwanted ads, slowing down performance.


2. Spyware: Collects data without consent, compromising privacy
and system resources.

DoS and DDoS Attacks

1. DoS: Overwhelms system with requests, causing crashes or


slowdowns.
2. DDoS: Uses multiple systems to flood a target, leading to
outages.

Privilege Escalation

1. Vertical: Gains higher permissions, allowing unauthorized


system changes.
2. Horizontal: Accesses unauthorized resources at the same
permission level.

Phishing Attacks

1. Deceives users into revealing sensitive information, leading to


unauthorized access.

Zero-Day Exploits

1. Exploits unknown vulnerabilities, allowing attackers to


compromise systems before patches are available.

Man-in-the-Middle (MitM) Attacks

1. Intercepts and alters communication, leading to data theft or


tampering.

SQL Injection

1. Exploits vulnerabilities in database queries, accessing or


manipulating data.

Buffer Overflow Attacks

1. Overwrites memory, potentially leading to system crashes or


arbitrary code execution.

Mitigation Strategies

 Regular Updates: Apply patches and updates.


 Antivirus Software: Detect and remove malware.
 Firewalls: Block unauthorized access.
 Intrusion Detection: Monitor for suspicious activities.
 Access Controls: Use strong authentication and authorization.
 Encryption: Protect data in transit and at rest.
 Security Training: Educate users on threats and safe practices.

For your newly established IT based business.You need to install a fully


featured OS on multiple employee computer.you need to decide between
window 7 and linux, considering specify features for your business needs.
Your task is to evaluate the design principles of both options to justify of
your find choice?

Evaluation of Design Principles: Windows 7 vs. Linux

1. Cost:

 Windows 7: Requires license fees, ongoing costs for extended support.


 Linux: Free for most distributions, lower overall costs, optional paid
support.

2. Support & Maintenance:

 Windows 7: Limited support, regular maintenance required, end of life


status.
 Linux: Extensive community support, regular updates via package
managers, flexible maintenance.

3. Security:

 Windows 7: More vulnerable due to outdated support, basic security


features.
 Linux: Generally more secure, advanced security features, rapid
patching.

4. Performance:

 Windows 7: Optimized but can degrade over time.


 Linux: Efficient, customizable for hardware, runs well on minimal
setups.

5. Software Compatibility:

 Windows 7: Broad compatibility with commercial and legacy software.


 Linux: Good open-source options, workarounds needed for some
commercial software.

6. Customizability:

 Windows 7: Limited customization.


 Linux: Highly customizable, various desktop environments and
configurations.

7. User Interface and Usability:

 Windows 7: Familiar, user-friendly for those used to Windows.


 Linux: Varies by distribution, modern UIs available but may have a
learning curve.

Recommendation:

 If your business needs compatibility with specific Windows-based


applications and a familiar environment, consider a modern version
of Windows rather than Windows 7.
 If cost, security, and customizability are priorities and your software
needs can be met with open-source alternatives, Linux is the better
choice.

4o

You might also like