Operating Systems
Operating Systems
III SEMESTER
1904304-Operating Systems
Regulation – 2019
Prepared by
QUESTION BANK
SUBJECT : Operating Systems
SEM / YEAR: III Sem/ II Year
UNIT I -PROCESSES
Introduction to operating systems - Evolution of Operating System - Operating System-structures –
System calls – System programs –Processes: Process concept – Process scheduling – Operations on
processes –Inter process communication – Communication in client-server systems.
PART - A
Q.No Questions BT Competence
Level
1. Give the objectives of an operating system. BTL-2 Understanding
2. List out the various operating system components. BTL-1 Remembering
3. Define Operating System. BTL-1 Remembering
4. What is the responsibility of kernel? BTL-1 Remembering
5. Analyze the layers in operating systems. BTL-4 Analyzing
6. List out some system calls required to control the communication system. BTL-4 Analyzing
7. What are the services of an operating system? BTL-1 Remembering
8. Is OS a resource Manager? If so justify your answer. BTL-3 Applying
9. What is meant by system call? BTL-1 Remembering
10. What is SYSGEN and system boot? BTL-2 Understanding
11. What is the purpose of system programs? BTL-1 Remembering
12. Compare and contrast serial processing and batch processing. BTL-5 Evaluating
13. Write the differences of batch systems and time sharing systems. BTL-2 Understanding
14. Do timesharing differ from multiprogramming? If so, How? BTL-3 Applying
15. Give the functions of operating systems. BTL-2 Understanding
16. Why API's need to be used rather than system calls? BTL-5 Evaluating
17. How would you build clustered systems? BTL-6 Creating
18. What is dual mode operation and what is the need of it? BTL-4 Analyzing
19. Illustrate the use of fork and exec system calls. BTL-3 Applying
20. What are the advantages of Peer –to- peer system over client -server BTL-6 Creating
systems?
21. Give the types of system calls in operating system. BTL-2 Understanding
PART – B
1. (i)Explain the various types of system calls with an example for each.(8)
(ii) Discuss the functionality of system boot with respect to an Operating BTL-5 Evaluating
System. (5)
2. Illustrate how the operating system has been evolved from serial
BTL-3 Applying
processing to multiprogramming system. (13)
3. (i) Explain the various structure of an operating system. (8)
(ii) Describe system calls and system programs in detail with neat sketch. BTL-1 Remembering
(5)
4. Describe the evolution of operating system. (13) BTL-2 Understanding
5. Discuss the pros and cons of serial processing and simple batch system.
BTL-2 Understanding
(13)
6. (i) State the operating system structure (4)
(ii)Describe the operating system operations in detail. Justify the
reason why the lack of a hardware supported dual mode can cause BTL-6 Creating
serious shortcoming in an operating system? (9)
10. Discuss hybrid system design of an Operating system. (13) BTL-4 Analyzing
11. Distinguish between the dual mode and multi-mode operation in operating
systems. (13) BTL-1 Remembering
15. Give the advantages of peer-to-peer systems over client-server systems? BTL-2 Understanding
PART – C
1. (i) With neat sketch discuss operating system overview.(8)
(ii) Enumerate the different operating system structure and explain with BTL-6 Creating
neat sketch. (7)
2. (i)State the basic functions of OS.(5) Evaluating
(ii)Explain system calls, system programs and OS generation.(10) BTL-5
3. Evaluate in detail the operating system services.(15) BTL-5 Evaluating
4. Summarize about four resources that will be allocated by operating system Evaluating
BTL-5
to users and processes.(15)
5. BTL-6 Creating
Develop System Call – OS Relationship.(15)
18. Give the four necessary conditions for deadlock to occur. BTL-5 Evaluating
19. “If there is a cycle in the resource allocation graph, it may or may not be BTL-6 Creating
in deadlock state“. Comment on this statement.
20. List out the methods used to recover from the deadlock. BTL-1 Remembering
21. Distinguish between CPU bounded, I/O bounded processes. BTL-2 Understanding
22. Show what are the various scheduling criteria . BTL-3 Applying
23. Point out the functions of Dispatcher Module. BTL-4 Analyzing
24. Is it possible to have deadlock with one process?justify. BTL-5 Evaluating
PART – B
1. (i) Define scheduling .Explain SJF scheduling algorithms . (8)
(ii) Compute the average waiting time for the processes using non-
preemptive SJF scheduling algorithm.(5)
Process Arrival Burst time
time
P1 0 7
P2 2 4
BTL-4 Analyzing
P3 4 1
P4 5 4
P5 3 4
9. Design how to implement wait() and signal() semaphore operations .(13) BTL-6 Creating
10. Explain Deadlock detection with suitable example. (13) BTL-4 Analyzing
13. Discuss in detail the critical section problem and write the algorithm for
producer consumer problem.(13) BTL-2 Understanding
14. (i) Is it possible to have concurrency but not parallelism? Explain.(6)
(ii) Consider a system consisting of four resources of the same type
that are shared by three processes, each of which needs at most two BTL-3 Applying
resources. Show that the system is deadlock free. (7)
3. Consider a system consisting of ‘m’ resources of the same type, being Evaluating
shared by ‘n’ processes. Resources can be requested and released by
processes only one at a time. Show that the system is deadlock free if the BTL-5
following two conditions hold: (15)
a) The maximum need of each process is between 1 and m resources
b) The sum of all maximum needs is less than m+n.
4. Consider the following system snapshot using data structures in the
Banker’s algorithm with resources A,B,C and D and process P0 to P4:
Max Allocation Available Need
ABCD ABCD ABCD ABCD
P0 6012 4001 3211 Evaluating
P1 1750 1100
P2 2356 1254
P3 1653 0633 BTL-5
P4 1656 0212
Using Banker’s algorithm, answer the following questions:
(i)How many resources of type A,B,C and D are there? (3)
(ii)What are the contents of the need matrix? (3)
(iii)Is the system in a safe state? Why? (3)
(iv)If a request from process P4 arrives for additional resources of (1,2,0,0)
can the banker’s algorithm grant the request immediately? Show the new
system state and other criteria. (6)
5. Consider the following set of processes with the length of the CPU-burst
time in given ms: all 5 processess arrive at time 0 in the order given.
Process Burst Time
P1 10
P2 29
P3 03
P4 07 BTL-6 Creating
P5 12
Draw four Gantt charts illustrating the execution of these processes using
FCFS, SJF, priority and RR(quantum=10)scheduling.
Also calculate average waiting time and turnaround time for each
scheduling algorithms. (15)
16. Illustrate what are the various Page Replacement Algorithms used in BTL-3 Applying
memory management. (13)
? Explainwhen page faults will occur? Describe the actions taken by
17. Evaluate Evaluating
operating system during page fault. (13) BTL-5
PART – C
1. Consider the following page reference string: 1, 2, 3, 4, 5, 3,4,1,6,7,8,7, 8,
9, 7, 8, 9, 5, 4, 4, 5, 3 How many page faults would occur for the following
replacement algorithms, assuming four frames? Remembering all frames
are initially empty. (15) BTL-5 Evaluating
i) LRU replacement
ii) FIFO replacement
iii) Optimal replacement.
2. (i) Explain in detail about paging in 32-bit and 64-bit architectures (5)
(ii) Consider a system that allocated pages of different sizes to its
BTL-6 Creating
processes. What are the advantages of such a paging scheme? What are
modifications to the virtual memory system provide this functionality?
(10)
3. (i) Consider the following page reference string: 1,2, 3, 2, 5, 6, 3, 4, 6, 3,
7, 3, 1, 5, 3, 6, 3, 4, 2, 4, 3, 4, 5, 1 Indicate page faults and calculate total
number of page faults and successful ratio for FIFO, optimal and LRU BTL-5 Evaluating
algorithms. Assume there are four frames and initially all the frames are
empty. (12)
(ii) Explain the effect of thrashing. (3)
4. Differentiate between internal and external fragmentation? Suppose that
we have memory of 1000 KB with partitions of size 150 KB , 200 KB,
250 KB, 100 KB AND 300 KB. Where the processes A and B of size 175 BTL-6 Creating
KB and 125 KB will be loaded, if we used Best fit and Worst fit? (15)
5.
Most systems allow programs to allocate more memory to its
address space during execution. Data allocated in the heap BTL-5 Evaluating
segments of programs is an example of such allocated memory.
What is required to support dynamic memory allocation in the
following schemes? (15)
16. Consider a file system where a file can be deleted and the disk space
reclaimed while the links to that file still exist. What problems may occur
if a new file is created in the same storage area or with the same absolute BTL-3 Applying
path name? How these problem be avoided? (13)
17. Evaluate Linked Allocation method. (5) Evaluating
What are the advantages and disadvantages of Linked Allocation? (8) BTL-5
PART – C
1. Give an example of an application in which data in a file should be
accessed in the following order BTL-6 Creating
(i) Sequential (8)
(ii) Random (7)
2. Discuss how performance optimizations for file systems might result in
difficulties in maintaining the consistency of the systems in the event of BTL-5 Evaluating
computer crashes. (15)
3. BTL-6 Creating
(i) Discuss the functions of files and file implementation. (8)
(ii)Explain free space management with neat example. (7)
4.
Consider a system that supports 5000 users. Suppose that you want to
allow 4990 of these users to be able to access one file
a) How would you specify this protection scheme in file system (7) BTL-5 Evaluating
b) Could you suggest another protection scheme that can be used
more effectively for this purpose than the scheme provided by the
file system? (8)
5. Determine the most common schemes for defining the logical structure of BTL-5 Evaluating
a directory? (15)
PART – C
1. On a disk with 200 cylinders, numbered 0 to199. Compute the number of
tracks the disk arm must move to satisfy the entire request in the disc queue.
Assume the last request received at track 100. The queue in FIFO order
contains requests for the following tracks 55, 58, 39, 18, 90, 160, 150, 38, BTL-6 Creating
184. Perform the computation to find the seek time for the following disk
scheduling algorithms. (15)
FCFS (ii) SSTF (iii) SCAN (iv) C-SCAN (v) LOOK
2. How does a DMA increases system concurrency? How does it complicate BTL-5 Evaluating
the hardware design? (15)
3. Distinguish between a STREAMS driver and a STREAMS module. (15) BTL-5 Evaluating
4. Why rotational latency usually not considered in disk scheduling How
BTL-6 Creating
would you modify SSTF, SCAN and C-SCAN to include latency
optimization? (15)
5. Describe the circumstances under which blocking I/O and non-blocking
BTL-5 Evaluating
I/O should be used. Why not just implement non-blocking I/O and have
processes busy-wait until their device is ready? (15)