0% found this document useful (0 votes)
16 views2 pages

Cit 2210 Operating Systems

Operating system

Uploaded by

samuelchikueze94
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views2 pages

Cit 2210 Operating Systems

Operating system

Uploaded by

samuelchikueze94
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

DIPLOMA IN INFORMATION TECHNOLOGY YEAR ONE SEMESTER TWO

CIT 2210: OPERATING SYSTEMS

INSTRUCTIONS:
Answer Question ONE and ANY other two Questions

QUESTION ONE (30 MARKS)

a) Identify any three examples of operating systems found on desktop computers


(3 marks)
b) A computer converts input data into valuable information. This valuable information is provided
through output devices. Identify any 3 output and any 3 input devices in a computer system
(6 marks)
c) Identify and give functions of the two parts that make up the microprocessor (4 marks)
d) Identify any three advantages of batch operating systems (3 marks)
e) A process is a program in execution. Describe the four parts that make up a process
(8 marks)
f) Briefly define the term dispatch latency (2 marks)
g) Identify any two memory allocation strategies (2 marks)
h) Distinguish between security and protection in computer systems (2 marks)

QUESTION TWO (15 MARKS)


a) A computer system is made up of various components. Identify and describe four components of a
computer system (8 marks)
b) Consider the following set of processes that arrive at time 0, with the length of the CPU
burst given in milliseconds:
Process Burst Time
P1 24
P2 3
P3 3
P4 4
P5 8

i. How much time does process P3 wait until it starts to execute, if the algorithm used is First-Come
First-Served? (2marks)
ii. Applying the Shortest Job First Algorithm, how much time does process P5 wait until it starts to
execute? (3 marks)
iii. Calculate the average time the CPU is busy executing these processes (2 marks)
QUESTION THREE (15 MARKS)

Page 1 of 2
a) Describe any four threats to a computer program (8 marks)
b) Describe any three security violations in a computer program (6 marks)
c) Identify any file extension in a computer system (1 mark)
QUESTION FOUR (15 MARKS)
a) Discuss any four page-replacement strategies in computer memory (8 marks)
b) Identify the term used to describe the erroneous situation that occurs if a program in execution
references a page that does not exist. (1 mark)
c) Describe any four levels of security in a computer system (4 marks)
d) In the context of computer memory management, distinguish between a page and a frame
(2 marks)

QUESTION FIVE (15 MARKS)


a) Distinguish between a threat and an attack in the context of computer systems
(2 marks)
b) Describe any three operations on files (6 marks)
c) Describe any four file attributes (4 marks)
d) Discuss the two parts that constitute the file system of a computer (2 marks)
e) In your own words, provide a brief definition of the term file (1 mark)

--END--

Page 2 of 2

You might also like