23IctE Part1
23IctE Part1
Instructions:
Answer all the questions.
Write your index number in the space provided in the answer sheet.
In each of the questions 1 to 50, pick one of the alternatives from (1), (2), (3), (4), (5) which is correct
or most appropriate and mark your response on the answer sheet with a cross (X) in accordance
with the instructions given on the back of the answer sheet.
1) Which of the following is/are correct?
𝐴 − BIOS (Basic Input Output System)is a computer program which is embedded in a memory
nstructions:
portion that stores data when a computer is powered on / plugged in.
Answer all the questions.
𝐵 − Static Random Access Memory(SRAM), Dynamic Random Access Memory(DRAM), L1
Write your
Cacheindex number
memory andinRegisters
the space are
provided in theofanswer
examples sheet.
memories that store data only when power is
In eachsupplied.
of the questions 1 to 50, pick one of the alternatives from (1), (2), (3), (4), (5) which is correct
or𝐶most
− Computer memory
appropriate and is classified
mark based on on
your response physical size, access
the answer time,aaccess
sheet with cross speed
(X) in and cost.
accordance
(1) 𝐴 only (2) 𝐵 only (3) 𝐶 only
with the instructions given on the back of the answer sheet.
(4) 𝐴, 𝐵 only (5) 𝐵, 𝐶 only
2) Central Processing Unit controls the other devices and performs the arithmetical operations while
………………………………… is a specialized processor which manages the memory and displays
the images on the monitor. This is also used in parallel processing, personal computers, work
stations and game consoles. Which is the most suitable word for the blank ?
(1) Graphic Processing Unit (2) Control Unit
(3) Arithmetic Logic Unit (4) Buffer
(5) Virtual Memory
5) Which of the following correctly lists the given computer storage components in the descending
order of access time?
(1)Magnetic tape, Hard disk , Primary memory , L3 cache memory , L1 cache memory,
Memory register
(2) Memory register, L1 cache memory , L3 cache memory , Primary memory , Hard disk ,
Magnetic tape
(3)L1 cache memory , L3 cache memory, Hard disk , Magnetic tape, Memory register,
Primary memory
(4) Magnetic tape, Hard disk , Primary memory , L1 cache memory , L3 cache memory ,
Memory register
(5)Magnetic tape , Primary memory, Hard disk , L1 cache memory , L3 cache memory ,
Memory register
7) Which of the following shows the correct output on applying bit-wise NOT operator on the binary
number 110011002 in a decimal form?
(1) 204 (2) −204 (3) 205 (4) −205 (5) −52
8) Which shows the correct output for 110000012 - 010010102 in 2’s complement method?
(1) 01110111 (2) 10110110 (3) 10001000 (4) 10001001 (5) 01001010
10) Two’s complement method is used to represent negative numbers. What’s the decimal value of
10011100 in 2’s complement representing 8 bits?
(1) 100 (2) −100 (3) −156 (4) 156 (5) 101
12) …………………………. is a system program that operates or controls a particular device attached
to computer and also provides software interface to hardware devices. Most suitable word for the
blank is,
(1) Basic Input Output System(BIOS) (2) Complementary Metal Oxide Semiconductor (CMOS)
(3) Device Driver (4) Utility software
(5) Language translator software
C
A B
A- B- C-
18) Designing computers on computer network is referred as “Computer Topology”. Consider the
following statements on topology.
∗ One host is connected with one or more hosts.
∗ All hosts are connected with each other in this topology
∗ Only some hosts are connected themselves
Which topology contains above characteristics?
(1) Bus topology
(2) Star topology
(3) Ring topology
(4) Mesh topology
(5) Tree topology
21) Sender, Receiver and medium are the basic requirements for data communication. Which answer
set only contains Free space medium?
(1)Twisted pair cable, Coaxial cable, Fiber optics cable
(2)Radio waves , Microwaves, Infrared rays, Satellite communication
(3)Shielded twisted pair cable, Coaxial cable , Fiber optics cable, Unshielded twisted pair cable
(4)Radio waves , Coaxial cable , Infrared rays, Microwaves
(5)Shielded twisted pair cable, Satellite communication, Microwaves , Coaxial cable
22) Consider about TCP/IP model in network reference models. Match the layers in P to S to their
corresponding functions listed from 1 to 4.
Function
Layer
1) Determining the size of datagram and
P. Application Layer transmitting the data
Q. Transport Layer 2) Carrying out the transmission to reach
R. Internet Layer physical network
S. Network Access Layer 3) Providing data delivery services between
two points
4) Contains programs and protocols used by the
network
(1) 𝑃 − 4 , 𝑄 − 3, 𝑅 − 1 , 𝑆 − 2 (2) 𝑃 − 3, 𝑄 − 2, 𝑅 − 1, 𝑆 − 4
(3) 𝑃 − 1, 𝑄 − 2, 𝑅 − 3, 𝑆 − 4 (4) 𝑃 − 4, 𝑄 − 1, 𝑅 − 3, 𝑆 − 2
(5) 𝑃 − 2, 𝑄 − 3, 𝑅 − 1, 𝑆 − 4
24) What would be the output of the following python code, if the input is 5?
Protocols Functions
A. Internet control message 1) A protocol for sending email to the mail server
protocol(ICMP) 2) Standard protocol used for email retrieval from
B. File transfer protocol (FTP) remote computer
C. Simple mail transfer 3) Allows sharing of files between remote
protocol(SMTP) computers in a reliable manner
D. Post office protocol(POP) 4) Monitoring and managing devices on IP
E. Simple network management network
protocol(SNMP) 5) Protocol which reports the unexpected errors
(1) 𝐴 − 5, 𝐵 − 3, 𝐶 − 4, 𝐷 − 2, 𝐸 − 1 (2) 𝐴 − 5, 𝐵 − 3, 𝐶 − 4, 𝐸 − 1, 𝐷 − 2
(3) 𝐴 − 5, 𝐵 − 3, 𝐶 − 1, 𝐷 − 2, 𝐸 − 4 (4) 𝐴 − 5, 𝐵 − 3, 𝐶 − 2, 𝐷 − 1 , 𝐸 − 4
(5) 𝐴 − 4, 𝐵 − 3, 𝐶 − 1, 𝐷 − 2, 𝐸 − 5
27) Match the layers of OSI model named from A to D , with it’s corresponding functions listed from 1
to 4
Layer Function
(1) 𝐴 − 1, 𝐵 − 2, 𝐶 − 3, 𝐷 − 4 (2) 𝐴 − 2, 𝐵 − 3, 𝐶 − 4 , 𝐷 − 1
(3) 𝐴 − 2, 𝐵 − 4, 𝐶 − 3, 𝐷 − 1 (4) 𝐴 − 1, 𝐵 − 3, 𝐶 − 4, 𝐷 − 2
(5) 𝐴 − 4, 𝐵 − 3, 𝐶 − 2, 𝐷 − 1
I
𝐴 − program 1 is used to delete the file “one.txt”
𝐵 − program 1 checks if the file “one.txt” is on the particular folder, if yes then deletes it.
𝐶 − Program II is used to delete the folder “myfolder”
𝐷 − Program II is used to delete the folder “myfolder” if it doesn’t contain any files.
Which of the above is/are correct?
(1) 𝐴, 𝐶 only (2) 𝐴, 𝐷 only (3) 𝐵, 𝐶 only (4) 𝐵, 𝐷 only (5) 𝐴, 𝐵, 𝐶, 𝐷 all
(1) 6
def func(a):
(2) 15
total_sum=0
for b in a: (3) 24
for num in b: (4) 21
total_sum+=num (5) 45
return total_sum
a=[[1,2,3],[4,5,6],[7,8,9]]
result=func(a)
print(result)
(1) 𝑤𝑎𝑙𝑘𝑖𝑛𝑔
def mystery(str): (2) 𝑤𝑎𝑙𝑘
out=" " (3) 𝑤𝑙𝑘
for char in str:
(4) 𝑘𝑖𝑛𝑔
if char=="i":
(5) 𝑙𝑘
break
if char=="a":
continue
out+=char
return out
print(mystery("walking"))
35) What is the output of the following python program if the inputs were -2,-5 and 9?
(1) 1 2
(2) 0 1 1 2 3 5
(3) 0 1 1 2 3 5 8
(4) 0 1 2 3 5
(5) 0 1 2 3 5 8
39) Arduino is an open source, low cost, easy to use hardware and software platform. There are
different kinds of Arduino boards available. Among that picture of an Arduino Uno board is shown
below. Name the parts numbered from 1 to 5.
(1) 1 −Reset button,2 − USB port,3 −Power supply jack ,4 − Analog input pins,5 − microcontroller
(2) 1 − USB port, 2 − Reset button, 3 −Power supply jack, 4 − Analog input pins,5 −microcontroller
(3) 1 − Reset button,2 − USB port ,3 − microcontroller,4 −Analog input pins ,5 −Power supply jack
(4) 1 − Reset button, 2 −Power supply jack ,3 − USB port,4 −Analog input pins ,5 −microcontroller
(5) 1 − Reset button,2 − microcontroller ,3 − Power supply jack 4 − Analog input pins,5 −USBport
40) Which is correct regarding the coding given below?
<style type="text/css">
p.title{text-align :center;color:red; }
</style>
(1) This defines internal styles and uses CSS ‘group’ concept
(2) This defines internal styles and uses CSS ‘class’ concept also it only defines style for <p> tag.
(3) This defines internal styles and uses CSS ‘class’ concept also it defines style for all tags
(4) This defines styles for all <p> tags.
(5) This is an example of the CSS “class selector” concept and the name of the class is “p.title”
What will be the output after executing the following SQL statement?
(1) member_ID member committee_ID committee
m01 John c01 John
m02 Jane NULL NULL
m03 Mary c02 Mary
m04 David NULL NULL
m05 Amelia c03 Amelia
1. <html>
2. <body bgcolor="green">
3. <h1>welcome all of you to online ICT seminar</h1>
4. <a href="#one"> A/L Student Selection</a>
5. <p> O/L ICT is not available</p>
6. <!-----selection-01----->
7. <h4 id="one">A/L ICT</h4>
8. <hr><p>Good Morning</p><hr>
9. <br><p> This section is for Student</p><br>
10. </body> </html>
44) Which statement(s) is/are incorrect regarding to Commercial Off The Shelf Software(COTS)?
𝐴 − 𝐶𝑂𝑇𝑆 is specially designed for vertical and horizontal marketing system
𝐵 − 𝐶𝑂𝑇𝑆 software is a personified software developed according to user’s requirements.
𝐶 − 𝐶𝑂𝑇𝑆 is a complexed software which contains too many unused features and takes time to
understand
(1) 𝐴 only (2) 𝐵 only (3) 𝐶 only
(4) 𝐴, 𝐵 only (5) 𝐴, 𝐶 only
<?php
$favcolor="red";
switch($favcolor)
{ case"red":
echo"your favorite color is red!";
case"blue":
echo"your favorite color is blue!";
case"green":
echo"your favorite color is green!";
default:
echo"your favorite color is neither red,blue nor green!";
}
?>
49) Which normal form is violated by the database relation stated below?
Item color Price Tax
50) Which relations is/are correct, if the above relation is converted into 3rd normal form?
𝐴 − 𝐼𝑡𝑒𝑚_𝑐𝑜𝑙𝑜𝑟 (𝐼𝑡𝑒𝑚 , 𝑐𝑜𝑙𝑜𝑟)
𝐵 − 𝐼𝑡𝑒𝑚_𝑃𝑟𝑖𝑐𝑒 (𝐼𝑡𝑒𝑚, 𝑃𝑟𝑖𝑐𝑒)
𝐶 − 𝐼𝑡𝑒𝑚_𝑇𝑎𝑥 (𝑃𝑟𝑖𝑐𝑒 , 𝑇𝑎𝑥 )
𝐷 − 𝐼𝑡𝑒𝑚_𝑃𝑟𝑖𝑐𝑒_𝑇𝑎𝑥 (𝐼𝑡𝑒𝑚, 𝑃𝑟𝑖𝑐𝑒, 𝑇𝑎𝑥)
(1) 𝐴, 𝐷 only (2) 𝐵, 𝐶 only (3) 𝐶, 𝐷 only
(4) 𝐴, 𝐶, only (5) 𝐴, 𝐵, 𝐶 all
***
AL/2023/20/E-II(A)
KOg;gjpg;GupikAilaJ / All Rights Reserved]
a) An uncompleted html code is given below. Fill in the blanks to get the above
output.
b) Consider the following CSS styling table to format the text in the above webpage.
c) The details inputted in the form shown in the above web page is stored on the
relation “Exam23" which is on the database mora.
To connect with the database mora, partially completed PHP script using
MySQLi procedural method is given below. Complete the PHP script.
<?php
$servername = "localhost"; $username ="root"; $password = "";
$db= "-------------------------------------";
$conn = mysqli_connect(------------------------------, ---------------------------,
------------------------, -----------------------);
if(!$conn) { die("connection failed:".mysqli_connect_error()); }
$sql = "CREATE TABLE _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ ( fullname
char(20),schoolname char(30),email char(30), gender char(6),stream char(25));";
if(mysqli_query(_ _ _ _ _ _ _ _ _ _ _ _ _ , _ _ _ _ _ _ _ _ _ _ _ _ _ _)) {
echo "table exam23 created successfully"; }
else { echo "Error creating table".mysqli_error(---------------------------------------------);}
mysqli_close($conn)
?>
<?php
$servername = "localhost"; $username ="root"; $password = "";
$db= "mora";
$conn = mysqli_connect($servername,$username,$password,$db);
if(!$conn)
{
die("connection failed:".mysqli_connect_error());
}
$sql = "--------------------------------------------------------------------------------------------------------
--------------------------";
$result = mysqli_query($conn, $sql);
if(mysqli_num_rows($result)>0)
{
while($row = mysqli_fetch_assoc($result))
{
echo $row['fullname']."-".$row['schoolname']."-".$row['stream'];
}
}
else
{
echo "0 result";
}
mysqli_close($conn) ?>
b) The following python program checks whether the inputted number is prime
number or not. Fill in the blanks in the code.
(i) What would be the output while entering the following secret pins in the
above code.
(1) 51020 value of C : ……………………………………………………
message : ……………………………………………………
(2) 5102 value of C : ……………………………………………………
message : ……………………………………………………
a.txt b.txt
f1 = ----------------------("------------------",'--------')
f2 = ----------------------("------------------",'---------')
for line in f1:
items = line.strip()._ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
tot = _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
print(items[0],tot, file = f2)
f1.close()
f2.close()
3) a) The below is the context diagram for the events that take place when a customer
is being proceed with the payment at Point of Sale system at a boutique.
List : Preparing management report, Total sales amount,Updated sold product amount,
Payment, Product details, Inventory amount
(𝐴): − − − − − − − − − − − − − (𝐵): − − − − − − − − − − − − − −
(𝐶): − − − − − − − − − − − − − (𝐷): − − − − − − − − − − − − − −
(𝐸): − − − − − − − − − − − − − − (𝐹) : − − − − − − − − − − − − − −
b) Choose the correct answers from the list and fill in the blanks.
d) Loading the developed system into the user’s computer is called deployment.
State whether the statements are “True” or “False” regarding System Deployment.
(You are required to write “True” or “False” in the space provided)
i) User will use both systems until he/she get to used with the newly developed
system in parallel deployment (----------------------------)
ii) Newly developed system can be implemented quickly using direct deployment
rather than other methods. Due to the unavailability of old system for a
longtime , user should understand and use the new system
(----------------------------)
iii) Pilot deployment is a method of examining and analyzing the system with the
group of users (----------------------------)
iv) In phase deployment, system will be implemented stage by stage until its
deployed completely for a group of people. (----------------------------)
b)
i) Complete the truth table for the circuit constructed only using universal gates.
A B P Q F
0 0
0 1
1 0
1 1
ii) Name the combinational logic circuit for the above truth table. (with inputs A
and B, output F)
…………………………………………………………………………………
…………………………………………………………………………………
c) The following picture depicts a small network built using a switch and router. A
personal computer is connected with switch and a server is connected with the
router. IP addresses and MAC addresses of the corresponding devices are
shown in the picture.
Part A
System will automatically operates the fan according to the room temperature
using a dc motor. Things needed for the above requirement and the circuit
diagram are shown below.
A system is created by the student using the above things and circuit diagram.
System reads the voltage using analog pin and converts it into a voltage
(0-1023) between 0 – 5V and converts the temperature into Celsius. This value
will be compared with the predefined value and according to the room
temperature motor will be turned on or off.
A piece of code for the operation of motor is stated below with blanks. The fan
will be turned on if the converted temperature is above 30°C otherwise not.
Fan is turned on → 𝑑𝑖𝑔𝑖𝑡𝑎𝑙𝑊𝑟𝑖𝑡𝑒(𝑚𝑜𝑡𝑜𝑟𝑃𝑖𝑛, 𝐻𝐼𝐺𝐻)
Fan is turned off → 𝑑𝑖𝑔𝑖𝑡𝑎𝑙𝑊𝑟𝑖𝑡𝑒(𝑚𝑜𝑡𝑜𝑟𝑃𝑖𝑛, 𝐿𝑂𝑊)
Fill in the blanks.
void loop()
{
int sensorValue = analogRead(sensorPin);
float voltage = sensorValue*5.0/1023;
float temp = voltage * 100;
if(------------------------)
{
--------------------------------------;
}
else
{
--------------------------------------;
}
}
AL/2023/20/E-II(B)
Part B - Essay
Instructions:
Answer four questions only.
Give clear labelled diagrams when necessary.
(Each question carries 15 marks)
1)
a) A logic circuit takes three binary numbers as input and outputs 1 if the decimal number denoted by
the three inputs is an even number, otherwise it outputs 0.
Assume that all three inputs only carries positive decimal numbers. In the above illustrated circuit,
A,B,C denotes from Most Significant Bit(MSB), to Least Significant Bit(LSB). F(A,B,C) denotes the
output.
i) Convert the above Boolean expression into Standard Sum Of Products (SOP) form.
ii) Simplify the derived Boolean expression in b)i) using Karnaugh diagram
iii) Write the Sum Of Products (SOP) expression derived from b) i) in the standard Product Of
Sum(POS) form
2)
a) IP addresses are used to uniquely identify the computers and devices connected in the network.
While assigning IP addresses, state one advantage using Variable Length Subnet Mask(VLSM)
rather than Fixed Length Subnet Mask(FLSM).
b) NSW company has got an IP address block 192.168.222.128/26 to distribute among its three
departments.
This IP address block should be sub netted to fulfill the below requirements. Assume that every
department is located on separate building. IP addresses should be assigned in an efficient way and
address loss should be minimized during subnetting.
i) State the Network address and broadcast address of the given IP address block.
ii) State the usable IP address range of the above given IP address block.
iii) State the subnet mask of the above given IP address block.
iv) Complete the below table after subnetting.
𝑁𝑆𝑊01
𝑁𝑆𝑊02
𝑁𝑆𝑊03
v) Draw the suitable network diagram for the above description. Assume that switches, router,
cables and all needed devices are provided.
[see
[see page
page two
three
AL/2023/20/E-II(B) -3-
3)
a) Draw an ER diagram for the below scenario.
The following paragraph describes about Football team, players and competitions. Each team
contains players for their own. Each team has unique team number(identifier), team name, main
stadium and the details about the city which the team belongs to. Each team has many players and
each player belongs to one team. Each player has identity number (unique identifier), name, date of
birth, started year and shirt number. Teams play in competition. Each competition includes a host
team and a guest team. Competitions will take place in host’s stadium. For each competition,
following things should be considered.
Competition date
Final result of competition
Players participated in final competition
Number of goals by players
Number of red and yellow cards received by the players
Players can be substituted during the competition
When substitutes were used
Each competition have three judges. Each judge has Judge identity number (unique identifier), name,
date of birth , time of experience. The one judge will be the main judge and other two will be the
supporting judges. State the primary keys and cardinalities clearly.
Use only the attributes and entities given in the list below while drawing the ER diagram. You can
choose your own names for relationships.
( 𝑇𝑒𝑎𝑚, 𝐼𝐷, 𝑆𝑡𝑎𝑑𝑖𝑢𝑚, 𝑐𝑖𝑡𝑦, 𝑛𝑎𝑚𝑒, 𝑃𝑙𝑎𝑦𝑒𝑟, 𝑆𝑡𝑎𝑟𝑡𝑦𝑒𝑎𝑟, 𝐷𝑂𝐵, 𝑁𝑢𝑚, 𝑠ℎ𝑖𝑟𝑡𝑛𝑢𝑚, 𝑑𝑎𝑡𝑒, 𝐻𝑜𝑠𝑡_𝑠𝑐𝑜𝑟𝑒,
𝑔𝑢𝑒𝑠𝑡_𝑠𝑐𝑜𝑟𝑒, 𝑛𝑢𝑚_𝑔𝑜𝑎𝑙𝑠, 𝑌𝑒𝑙𝑙𝑜𝑤𝑐𝑎𝑟𝑑, 𝑅𝑒𝑑𝑐𝑎𝑟𝑑, 𝑡𝑖𝑚𝑒, 𝑖𝑠𝑚𝑎𝑖𝑛, 𝐸𝑥𝑝𝑦𝑒𝑎𝑟, 𝑀𝑎𝑡𝑐ℎ − 𝑃𝑙𝑎𝑦𝑒𝑟,
𝑀𝑎𝑡𝑐ℎ, 𝑅𝑒𝑓𝑒𝑟𝑒𝑒 )
b) Consider the Mark_Sheet relation.
iv) In which normal form does the above relation exist? State your answer with the reason. Convert
to next normal form. Write the relations in structured method.
4)
a) A positive integer is a perfect number according to number theorem. In number theory, a perfect
number is a positive integer that is equal to the sum of its proper positive divisors, that is, the sum of its
positive divisors excluding the number itself (also known as its aliquot sum). Equivalently, a perfect
number is a number that is half the sum of all of its positive divisors (including itself).
Using the above program, write a python program to get an integer as input from user and outputs
whether that is a perfect number or not a perfect number.
b) A word or a sentence is got as input and being validated according to below conditions.
Space, special characters, numbers in the string will be removed and it will convert to small letters.
The first letter and last letter should be same in the sentence. The second letter and the letter before
the last letter should be same also. Like that if that word or sentence is symmetrical it’s called
palindrome.
Write a python program to get a word or sentence as a input(Assume that Space, special characters,
numbers in the string will be removed before inputting ) and convert it into small letters and
displaying the output whether the string is a palindrome or not a palindrome.
Note : While inputting, The sentence “Never odd or even” will be inputted as
Neveroddoreven. madam , repaper are examples for palindrome.
c) Teacher asked a student to write a python program to find whether the given year is a leap year
or not.
If a year is leap year then it should satisfy the following conditions.
The given year should be a multiple of 100 as well as multiple of 400. While dividing
the given year by 100 and 400 , if the remainder is 0 then the given year is a leap year.
If the given year is not a multiple of 100 , then it should be a multiple of 4. If you don’t
get remainder as 0 while dividing by 100, but when the remainder is 0 while dividing by 4,
Then the given year is a leap year.
For an example 2000 is leap year which can be divided by 100 and 400 with a zero
remainder. 1996 is also a leap year which can’t be divided by 100 but can be divided by 4
with a zero remainder.
5)
a) One face mall is a famous business store and supermarket in the city which sells variety of goods
such as food, jewels, clothes, electronic items, books and etc. Each sector stated above has a physical
store in the mall.
Considering your advice, one face mall has implemented an ecommerce system based on internet to
conduct their business in online too. Most of the stores in the mall has joined the one face e-mall
system to conduct their businesses in online.
i) State the suitable e-commerce business type for the above scenario.
ii) In which business organization type does the stores in one face mall will be included?
iii) Which revenue model will be used in one face e-mall’s online business system?
iv) Which revenue model will be used in stores which joined one face e-mall’s online business
system?
v) State the advantage for the following people by implementing the above scenario,
i) Customers
ii) Stores in the one face mall
b) Multiagent systems can be used to do some works done by humans. A hospital uses a doctor
agent software which accepts queries from patients and replies to it. This scenario is described as
following.
Patient submit the query command to the user agent. This user agent assigns this task to a doctor
agent. Doctor agent sends a request command to a resource agent. Resource agent sends the request
command to the knowledge base and gets the electronic data from the knowledge base. Also
resource agent sends an announcement to doctor agent. This announcement proceeds through user
agent to user and the data will be displayed to user.
c) Agent is a computer program which acts autonomously towards it’s goals in any environment.
i) Define the term Software Agent
ii) State two characteristics of an agent
6)
a) Assume that we have a computer which uses 18 bit virtual addresses from 0 up to 256K. Assume
further that this computer has only64 KB of physical memory and the page size is 8 KB. Above 18bit
virtual address is made up of the bits of the page number followed by offset bits. User runs a particular
program having a size of 64KB on this computer. A few selected fields of the page table of that
process at a particular time are shown in the figure below.
0 011 1
1 101 1
2 000 0
3 110 1
4 000 0
5 111 1
6 000 0
7 000 0
Notes :
The present/absent bit indicates the validity of the entry.If this bit is 1, the entry is valid and can be
used. If it is 0, then the relevant virtual page is not in physical memory.
i) If the memory is byte addressable, find the maximum usable size of memory?
ii) State the number of pages will be created?
iii) State the number of bits that will be assigned for page size/displacement/offset?
iv) How many frames will be created?
v) For which physical address will the virtual address 10000 mapped to?
vi) For which physical address will 001010 1100 0110 0010 mapped to?
b) The central theme of modern operating system is process. Process is a program in execution.
Process can have many states. Those states are shown below in the diagram.
i) Choose the correct answer from the list to fit the blanks in the above seven state
transition diagram. Write the correct answers against the labels in your answer sheet.
[Short term schedular, schedular dispatch, I/O or event wait, I/O or event completion,
Swapped out and blocked, Swapped out and waiting, Terminated, Waiting, Interrupt,
Active, Running]
ii) State 02 reasons for the arrow C in the above seven state transition diagram.
iii) State 02 reasons for creation of process.
iv) Operating system resolves every resource allocated, after the ending of process. List out
reasons for process termination.
v) Process in ready state is changed to state B by arrow A. Which schedular is responsible
for above act?
c) Operating system allocates disk spaces to files. Operating system deploys many ways to allocate
disk spaces to files.
i) Which are the main three methods used by operating system for file allocation.
ii) Name the file allocation technique which encourages fragmentation