22516-Practice Test Unit 1 2
22516-Practice Test Unit 1 2
(marks 14*2)
MS-DOS Windows OS
Requires manual input for tasks. User-friendly with visual icons and windows.
A Real-Time System is a type of operating system that guarantees a certain capability within a specified
time constraint. It is used in environments where time is critical, such as medical systems, robotics, and
embedded systems.
Soft real time operating system and hard real time operating system
• Process Management: The OS manages the execution of multiple processes, ensuring each
process gets sufficient CPU time.
• Memory Management: The OS efficiently allocates and deallocates memory space to programs,
ensuring optimal memory usage.
A system call is a programmed request from a user-level application to the operating system, allowing it
to request services such as file manipulation, process control, or communication.
Process Management is the function of the OS that handles the creation, scheduling, execution, and
termination of processes, ensuring efficient CPU utilization and multitasking.
Main Memory Management is the process by which the OS manages the allocation and deallocation of
the computer's primary memory (RAM) to various programs and processes, ensuring optimal use of
memory resources.
File Management refers to the OS's ability to create, delete, read, write, and organize files on storage
devices, as well as manage file permissions and access control.
I/O System Management involves managing the input/output devices of a computer, including handling
device drivers, buffering, and ensuring data is transferred efficiently between the hardware and
processes.
Distributed OS Network OS
Fault Tolerance: Offers higher fault tolerance, Fault Tolerance: Less fault tolerant because each
as tasks can be shifted from one machine to computer runs independently, and failure of one
another in case of failure. system affects only that system.
Examples: UNIX, Linux (network version), Windows
Examples: Amoeba, Mach, Plan 9.
Server.
Response Time: Response time is not guaranteed; it Response Time: Response time is guaranteed, and
depends on how the system schedules tasks. tasks must be completed within a fixed time frame.
Task Scheduling: Uses techniques like round-robin Task Scheduling: Uses priority-based or deadline
or priority scheduling to allocate CPU time to scheduling to ensure critical tasks are completed on
multiple tasks. time.
A Multiprogrammed Operating System is an operating system that allows multiple programs to reside in
the system's memory at the same time, improving the overall utilization of the CPU. It maximizes CPU
usage by ensuring that the processor always has something to execute, switching between tasks when
one becomes idle, such as when waiting for I/O operations.
1. Job Scheduling: The OS keeps several jobs in memory simultaneously and selects one of them to
run. When the running job waits for an event (like I/O completion), the OS switches to another
job, ensuring that the CPU is always busy.
2. Efficient CPU Utilization: Instead of keeping the CPU idle during long I/O operations, it switches
to other ready-to-execute jobs. This increases CPU efficiency and ensures that all system
resources are optimally used.
3. Memory Management: Since multiple jobs reside in memory at once, efficient memory
management is essential. The OS must allocate memory to different programs and protect them
from interfering with each other.
4. Context Switching: The OS frequently switches between programs to utilize the CPU efficiently.
This involves saving the state of the current program and loading the state of the next program
to be executed.
Example of Multiprogramming:
Consider a scenario where one program is reading data from a disk while another program is performing
computations. In a multiprogrammed system, while the first program is waiting for the disk read to
complete, the CPU can switch to the second program and start executing its computations. This way, the
CPU isn't wasting time and remains busy.
Advantages:
• Increased Efficiency: The CPU can execute more than one job at a time, reducing idle time and
improving throughput.
• Better Resource Utilization: The system's memory and CPU are used efficiently because multiple
programs share resources.
Disadvantages:
• Complexity: Managing multiple programs and ensuring efficient scheduling can add complexity
to the operating system.
1. Permission Groups
Each file and directory has three user based permission groups:
• Owner: the owner permissions apply only the owner of the file or directory, they will not impact the
actions of other users.
• Group: the group permissions apply only the group that has been assigned to the file or directory,
they will not effect the actions of other users.
• All users: the all users permissions apply to all other users on the system, this is the permission group
that you want to watch the most.
2. permission types
1. Read: the read permission refers to a users capability to read the contents of the file.
2. Write: the write permissions refers to a users capability to write or modify a file or directory.
3. execute: the execute permission affects a users capability to execute a file or view the contents of a
directory.
• You can view the permissions by checking the file or directory permission in your favorite GUI file
manager or by reviewing the output of the \”|s |”\ command while in the terminal and while working in
the directory which contains the file or folder.
When in the command line, the permissions are edited by using the command chmod.
Several protection methods are developed by keeping in mind that, the system knows the recognition of
each user. - The user authentication is the method to identify the user while logging into the system. -
Authentication enables organizations to keep their networks secure by permitting only authenticated
users or processes to gain access to their protected resources.
1. Passwords: username and password is simplest and most commonly used authentication. The
simplest implementation just maintains a central list of login name and password pairs.
2. Physical identification: physical object such as plastic card with magnetic strip on it can be used for
authorization of users. So combination of cards and password is used in this method.
3. Countermeasures: a user should be allowed to login only from specific terminal and fixed time slot of
particular days should be given to each user. in this simple approach, one special login name with an
easy password is used.
1. Password aging: administrator in the system with /etc/shadow file can enforce the users to change
the password after some predetermined time. Command used for updating the fields with appropriate
options is passwd.
2. Shell Restriction: to control the users activities, administrator set up the user account with a special
restricted shell.
Real-Time System (RTS) is a computer system that is designed to perform tasks and respond to inputs or
events within a strict time constraint. The key characteristic of a real-time system is its ability to provide
predictable and timely responses to events, ensuring that tasks are completed within a predefined time
limit, known as a deadline.
In real-time systems, missing a deadline can have severe consequences, especially in critical applications
such as medical devices, industrial control systems, or aviation systems, where timing is crucial for the
proper functioning of the system.
1. Deterministic Behaviour:
The system must behave in a predictable manner, where every task has a guaranteed start and
end time. This is vital for time-sensitive operations.
2. Deadline-Driven:
Real-time systems are deadline-oriented. The correctness of an operation depends not only on
the logical correctness of the computation but also on its timeliness.
3. Reliability:
These systems must operate continuously and be highly reliable, as failure to meet deadlines
can lead to critical failures or safety hazards.
4. Concurrency:
Real-time systems often need to handle multiple events concurrently. They must manage and
prioritize tasks so that high-priority tasks are completed first.
5. Task Prioritization:
In real-time systems, tasks are usually assigned priorities. Tasks with higher priority (e.g., tasks
related to safety or urgent requirements) pre-empt lower-priority tasks to ensure timely
execution.
Examples:
o Industrial robots
Examples:
o Video streaming
o Gaming applications
2. Scheduler:
The scheduler determines which task should be executed next, based on task priorities and
deadlines. Scheduling in real-time systems uses algorithms like Rate Monotonic Scheduling
(RMS) or Earliest Deadline First (EDF).
3. Task Management:
The system must manage multiple tasks concurrently, ensuring that tasks do not interfere with
each other, and that high-priority tasks can preempt lower-priority tasks when necessary.
4. Interrupt Handling:
Real-time systems must handle external events (such as sensor inputs) promptly. Interrupts
allow the system to stop the current task, handle the incoming event, and then resume the
interrupted task.
1. Embedded Systems:
3. Industrial Automation:
4. Telecommunications:
• Automotive Systems:
1. Process control.
2. File management
3. Device management.
4. Information maintenance.
5. Communications.
End, Abort.
Load, Execute.
2.File management
Create a directory.
Create a link.
3. Device Management
4. Information maintenance
• To do Information maintenance.
5. Communications
• For communicating among calls