0% found this document useful (0 votes)
5 views4 pages

2016 Nov

past papers operating system

Uploaded by

hosea cheloo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
5 views4 pages

2016 Nov

past papers operating system

Uploaded by

hosea cheloo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 4
easytvet.com 2920/105 OPERATING SYSTEMS November 2016 Time: 3 hours THE KENYA NATIONAL EXAMINATIONS COUNCIL. DIPLOMA IN INFORMATION COMMUNICATION TECHNOLOGY MODULE! OPERATING SYSTEMS: hours. INSTRUCTIONS TO THE CANDIDATES This paper consists of EIGHT questions, Answer any FIVE of the EIGHT questions in the answer booklet provided. All questions carry equal marks, Candidates should answer the questions in English ‘This paper consists of 4 printed pages. Candidates should check the question paper to ascertain that all the Pages are printed as indicated and that no questions are missing. P2016 The Kees Nasional Examinations Counell, ‘Turn over (by (c) (dy (b) (e) (b) (©) (d) 4 (a) 2920/1085 easytvet.com Explain the term system call as applied in operating systems (2marks) Outline four benefits of virtual memory in computers. (4 marks) Describe three strategies that could be used to mitigate deadlocks in operating systems, {6 marks) (i) Several resources are prerequisite for a successful process execution by the CPU, Outline four examples of these resources that should be availed to the CPU (4 marks) (ii) Sif was requined to identify advantages of the pre-emptive job scheduling techniques, Explain two advantages that she could have identified. (4 marks) Outline three file operations that could be applied to a file, (GB marks) (Define the term sector as applied in computer storage. (2 marks) i) With the aid of a diagram, describe file allocation table as used in operating systems. (S marks) (® Outline twa limitations of fixed memory partitioning, (@ marks) (ii) Differentiate between single and double buffering as used in WO ports registers. (4 marks) ‘Tom would like to design a memory sysicm that uses best-fit placement algorithm. Explain two limitations of this algorithm that would affect the performance of the memory. (4 marks) Explain each of the following terms as used in operating systems: @— kermel; (2 marks) (ii) monitor. (2 marks) Elsie was required to select an operating system that would be used on a server computer to provide a wide range of services to other desktop computers, ()—Mentify the most appropriate type of eperating system that she could select justifying your answer. (2 marks) (ii) Explain two benefits that her company could realize when using the operating system identified in (i), (4 marks) (Explain the term Remote Procedure Call (RPC) as used in operating systems (2 marks) (i) Differentiate berween communication and starage VO devices, (4 marks) A computer is made up of different types of internal buses to facilitate communication, Explain two types of such buses found in a computer system. (4 marks} (i) Outline three examples of roles that could be provided by a parent processor. G marks) (i) With the aid ofa diagram, describe the burst DMA mode of operations, (4 marks) November 2016 easytvet.com (b) With the aid of a diagram, describe a hierarchical file system, (5 marks) (©) Mark proposed a file encryption technique for his company's file system, Explain two techniques that he could have proposed (4marks) (d) Deadlocks are inevitable in operating systems. Explain two conditions that should hold to trigger this anomaly. (4 marks) 5. (a) (i) Name two ways of creating processes during execution by operating system (2 marks) (ii) Outline four advantages of peer-to-peer file sharing, (4 marks) (b) Differentiate between seek dime and rovational delay as used in disk management (4 marks) (c) Identify the type of memory used in cach case: (i) temporarily store results of processing by CPU; (1 mark) (ii) retains stored information event after computer restaris; (0 mark) Gil) portion of hard disk that is logically addressed as a main memory; (1 mark) (iv) bridges the speed gap between the processor and RAM; (1 mark) (@) Sam was required to enumerate objectives of inter process communication in operating systems during a regional symposium for programmer's. Explain three abjectives that he could have outlined. (6 marks) 6 — (@)-—i)_—_Explain the term frame as applied in memory management, (2 marks) (ii) Differentiate between base register and. bound register as used in memory ‘management, (4 marks) {b) Monolithic operating systems are not popular, Outline faur limitations of monolithie ‘operating systems that could be influencing this trend, (4 marks) (©) With the aid of sketches, explain two issues associated with memory fragmentation, (4 marks) (@) Maria intends 10 use round robin job scheduling algorithm in an operating system. Explain three benefits of using this algorithm: (6 marks) 7. fa) fi)—_Outline two factors to be considered when Selecting computer memory, other than cost. (2 marks) (ii) Differentiate between 1/0 bound and CPU bound jobs, (4 marks) (b) Define the term dispatcher as used in operating systems. (2 marks) (ii) Describe three advantages of paging memory as used in memory management, (6 marks) 2920/1005. 3 Turn over November 2016 e & (b) (e) (a) 2920105 easytvet.com Lloyd was required to design a file system fora client that will support indiscriminate access of files by system users. (i) Identify the most appropriate file access method that he could use justifying your answer. (2 marks} (ii) Explain two advantages of file access method identified in (i). (4 marks) Figure | shows a sketch ofa section of a hard disk, Explain the functions of each of the parts labeled (i) and (ii), (4 marks) o (ii), Figure | Dennis investigeted challenges faced while using non-preemptive job scheduling in operating syslems, Explain two challenges that he could have established. (4 marks) Bernard intends to configure access contro! list (ACI) in a one of his client's file system. Explain two feasons that could influence his decision. (4 marks) (Cindy was required to indentify characteristics of'a 4" generation operating system during an exam, Outline four characteristics that she could have listed. (4 marks} (ii) RDS Company Lid. intends to deploy Redundant Array of Independent Disks (RAID) in its file system, Explain two benefits that the company could realize from using the technology. 4 marks) ‘THIS IS THE LAST PRINTED PAGE. Novernber 2016

You might also like