Introduction To Operating System: Scope of The Syllabus Probable
Introduction To Operating System: Scope of The Syllabus Probable
Q1. What is Operating System? Explain the services provided by operating system.
Oct 04, 07 Mar 09, 20(3)
Operating System:
(1) Operating system is a layer between Hardware and Software.
(2) An operating system (OS) is a collection of software that manages computer hardware
resources and provides common services for computer programs.
(3) OS enables computer hardware to communicate and operate with the computer software.
It manages the computer's memory, processes, and all of its software and hardware.
Operating systems perform basic tasks, such as recognizing input from the keyboard, sending
output to the display screen, keeping track of files and directories on the disk, and controlling
peripheral devices such as disk drives and printers.
(4) Operating systems can be classified in terms interface. as follows: Character User
Interface (CUI): In which the user can interact with computer by passing predefined text
command only. Graphical User Interface: GUI is a type of user interface that allows users to
interact with Computer with images rather than text commands by using hand held devices
(like mouse etc.). (5) Operating systems can be classified in terms of processing capability as
follows:
P ag e |2
Computer Science ( D9) : XII - Paper –I
Q2. Which are the three major areas in which the operating system divides its services.
Give example. OR What are the basic services provided by operating system?
Mar02,06,08,09,13(3) Oct04,07,14,15(3)
Main functions of Operating system: Operating system divides its services in the following
three main areas.
(a) Information Management (IM)
(b) Process Management (PM)
(c) Memory Management (MM)
Process Management: (1) A program in execution is known as process. (2) The process
management of operating system manages processes, enable processes to share information,
protect process resources and allocate system resources to processes. (3) Some of the system
services (or calls) provided under information management. (a) Read a process (b) Block a
process (c) Resume a process (d) Terminate a process (e) Suspend a process (f) Delay a
process (g) change the priority of the process (h) Generate a process.
Memory Management: (1) Every program (or process) must be loaded into main memory
before its execution. (2) To improve CPU utilization, multi-tasking operating system may
contain several processes in the memory. (3) The memory management of operating system
takes care of allocation and de-allocation of memory space to the various processes. (4) The
operating system keeps list of all free memory location. Operating system loads the program
into memory and modifies the list. (5) The system services (or system calls) in memory
management are: (a)To allocate a chunk of memory to a process. (b) To free chuck of
memory from a process.
Q3. What is meant by a system call? How it is used? How does an application program
(AP) use these calls during execution? Oct03, Mar06 (3)OR What is system Call? List
any two system calls for memory management, Process management and information
management. Mar15, Ju117 (4) OR Explain Services of Operating System with its
System Call. Oct 09 (3)
System call: System call provides the interface between a process and the operating system.
These calls are generally available as assembly language instructions. A system call is a way
for programs to interact with the operating system.
System calls in information management: (a) Create files/directories. (b) Open
files/directories (c) Delete, copy or close files d) Change working directories. (e) Read data
from file to buffer (f) Write data from buffer to file (g) Move file pointer etc.
System calls in process management: (a) Read a process (b) Block a process (c) Resume a
process (d) Terminate a process (e) Suspend a process (f) Delay a process (g) Change the
priority of the process (h) Generate a process.
P ag e |3
Computer Science ( D9) : XII - Paper –I
Internet based operating system:(1) Windows 98 can be easily connected to Internet. (2)
Microsoft introduced many internet based programs such as Internet Explorer 4.01, outlook Express and
Windows address book to work fast. (3) The Internet conference can also be arranged.
Improved Hardware Support: (1) Windows 98 introduced with improved hardware support and it is perfectly
integrated with operating system. (2) This makes it smother and easier to install USB (Universal Serial Bus),
AGP (Accelerated Graphic port), DVD (Digital Versatile Disk) etc.
System File Checker: Windows 98 introduced 'System File Checker', which scan and repair corrupt or missing
files.
FAT 32 File system: (1) Windows 98 supports FAT-32 File system of previous version of Windows 95. (2) It
helps to upgrade the disk storage efficiency.
Features of Windows NT: Following are the main features of Windows NT.
(1)Multiuser, Multitasking and Multithreading OS: Windows NT is a multiuser,
multitasking and multi-threading Operating system.
(2) NTFS File System: Windows NT introduced default file system NTFS (New Technology
File System), which is capable of recovering from disk errors automatically, support large
sized hard disk, provide security like permission and encryption.
(3) Windows NT is a 32-bit Operating system.
(4) Hardware Abstraction Layer: This feature enables Windows NT to run regardless of
the hardware platform.
(5) Remotely Access: This feature allows user to log on the system remotely.
(6)Systematic multiprocessing in Windows NT allows it to schedule various tasks on any
CPU in a multiprocessor system.
(7) Interface: It has features like 'Start' button, Taskbar, Explorer, Network Neighborhood,
and Briefcase etc.
P ag e |4
Computer Science ( D9) : XII - Paper –I
Q6. What are components of LINUX operating system? Explain three features of
LINUX.Mar 04(3)
Introduction to Linux OS: (1) Linux is a popular version of Unix Operating system. (2) In
1991, Linus Torvalds' released the Linux kernel as free, open-source software. (3) Open
source means that the code is fully visible, can be modified and redistributed.
Components of Linux OS: Primarily, Linux Operating System has the following three
components.
Kernel: Kernel is the core part of Linux. Kernel consists of various modules and it interacts
directly with the underlying hardware. Kernel provides the required abstraction to hide low
level hardware details to system or application program.
System Library: System libraries consist of special functions using which applications
access features of kernel, and which implements most of the functionalities of OS.
System Utilities: System Utility programs are responsible for doing specialized, individual
level tasks. These Utilities has all the OS capability enhancement software including
language compiler, text editor, text processing programs, and a wide variety of utility and
tools.
Q7. List any six features of LINUX Operating System. OR State features of LINUX
operating system. Mar14,0ct09, 3,14(3)
Features of Linux Operating System: Following are some of the important features of Linux
OS. (1) Multi-User: Linux is Multi-User Operating system. Multiple users can access system
resources such as memory, I/O devices etc. at same time.
(2) Multiprogramming: Linux is Multiprogramming operating system. Multiple
applications or utilities can run at same time.
(3) Open Source: Linux kernel as free, open-source code. Linux is free to use. Linux is open
source and its source code is freely available.
(4) Security: Linux provides user security using authentication features like password
protection, controlled access to specific files, encryption of data etc.
(5) Graphical User Interface: Linux have packages which can be installed to make whole
OS graphics based as Windows.
P ag e |5
Computer Science ( D9) : XII - Paper –I
(6) Application Support: Linux has its own software repository from where users can
download and install thousands of applications just by issuing a command in Linux Terminal
or Shell.
(7) Windows application Support: Linux can also run Windows application if needed.
Q8. What is file system? List and explain types of file systems used in OS.Mar 15, 18 (3)
Q9. Explain file system related to Information Management with file operations
only.Mar04,.07(4)
Operations of file: (1) An operating system provides a set of operations to deal with files and
their contents. These operations are known as file operations.
(2) Different operating systems provides different file operations, some are common.
Create: It is used to create a new file. When the file is created, there must be sufficient
memory space for the file and an entry must be made for the file within the directory.
Delete: The file can be deleted if no longer needed. It is known as deleting a file. To delete a
file mean, searching the file name within the directory entry and releasing the memory
location and other details of the file from directory entry.
Open: For reading and writing from an existing file, a file must be opened before using it.
This operation is known as opening a file.
Close: When we close the opened file, this is known as closing a file. After completion of all
the operations on file, the file must be closed.
Read: Accessing the data from an existing file is known as reading a file. Before reading a
file must be opened. Read operation is used to read the stored data from the file.
Write: Storing data to the file is known as writing a file. Before writing operation, a file must
be opened. Writing operation is used to store the data to the file.
Append: Adding new data at the end of an existing file is known as appending a file. Before
append operation, a file must be opened. Appending operation is used to add the data at the
end of an existing file.
Rename: To change the name of the file to new name, it is known as renaming a file.
Copy: When we create another copy of an existing file it is known as copying a file.
P ag e |6
Computer Science ( D9) : XII - Paper –I
Q10. Explain the following terms in case of Magnetic Disk. (i) Track and Sector (ii) Seek
Time (iii) Transmission Time (iv) Latency/Rotational
Time.Mar06,09,10,0ct03,06,Ju117(4)
(i) Track and Sectors:
1) Magnetic disk surface is divided into number of
concentric circles called tracks. The number of tracks
varies depending on the disk type. 2) A track is further
divided into smaller areas called sectors. A sector is a
smallest unit of information which can be read from or
written to the disk. 3) The disk address is comprised of the
sector number, track number, and surface number.
(ii) Seek Time: The time required to position the read/write
called the seek time.
Device Driver:1) The computer program which controls a particular device is called device
driver. 2) Device driver, simply known as driver is also called as hardware deriver. 3) Device
drivers are required to operate the device correctly connected to the computer. It enables the
operating system to interact with hardware devices. 4) Device driver for the particular devices
changes one operating system to another. 5) It is essential that a computer have the correct
device drivers for all its parts to keep the system running efficiently.
Q12. What is VDU? Explain Dumb Terminal and Intelligent Terminal. OR Define the
term "Terminal I/O" Oct07,09(4),Mar18(3) Mar 10, Jul 8
VDU (Video display Unit) or Terminal I/O: (1) A screen usually associated with a keyboard
and together they form a video display unit (VDU) also known as video display terminal
(VDT) or terminal I/O. (2) It can be used as both as input and an output device. (3) There are
two types of terminal I/O hardware. (a) Dumb Terminal (b) Intelligent Terminal
(a) Dumb Terminal: (1) A dumb terminal consists of limited amount of memory and a
microprocessor on which small programs can be run. It performs basic input/output
operations. (2) A dumb terminal does not process on input character.
(b) Intelligent Terminal: (1) Intelligent terminal consists of more memory, a powerful
hardware and software as compared to dumb terminal. (2) It can carry out some process on
input characters, it can also process independently.
P ag e |7
Computer Science ( D9) : XII - Paper –I
Q13. What is Video RAM? Explain use of Attribute Byte and Data Byte of Video RAM
with example. Mar08 13,0ct11,13,Jul16(4)
Video RAM-(VRAM):
1) The terminal hardware itself has a memory known as video RAM. 2) Generally, an
alphanumeric screen displays a character matrix of 25 lines by 80 characters. (ie. 25 x 80 =
2000 characters). 3) Video RAM contains characters which are currently displayed on the
screen by the video controller using display electronics. 4) Video RAM consist of 2000 data-
bytes preceded by 2000 corresponding attributes bytes as shown in the figure.
Attribute Data Attribute Data
Byte 0 Byte 0 Byte 1 Byte 0
Attribute Data
Byte 1999 Byte 1999
(5) VRAM contains contiguous block of memory, and every two bytes for each character.
The first byte indicate "Data-Byte" and second is known as "Attribute-Byte". (6) All 2000
characters are stored in extended 8-bit ASCII code in the video RAM. These are known as
"Data-Byte".(7) There is one "Attribute Byte" for each data-byte. The attribute byte shows
whether the character to be displayed is Bold, Italic, Underlined, blinking, inverse etc.
P ag e |8
Computer Science ( D9) : XII - Paper –I
Q15. Why keyboard is referred as memory map terminal? Explain the multiple
memories involved in the input-output operations between the keyboard and screen.Mar
05(4)
Keyboard as memory map terminal: (1) When you type, the keyboard analyzes what
characters to send to the computer. It maintains these characters in its memory buffer and
then sends the data. (2) For moving any data in or out of the video RAM, ordinary load or
store instructions are sufficient. So, keyboard is referred as memory map terminal. (3)
Following are memories are involved in I/O Operation between keyboard and screen. (a)
Internal memory of Keyboard: When a character is keyed in, the 8—bit extended ASCII
value is stored temporarily in keyboards memory. (b) Video RAM: The ASCII code for the
character is moved in the VRAM at the corresponding position with appropriate
coordinates.(c) Operating system buffer: The operating system has two separate buffers for
input and output operations. (d) I/O area of application program: The stored data of operating
system buffer is flushed out the I/0 area of the application program which wants that data.
Q16. What is Process? Explain running, ready and blocked process_ states of Process
Management. [Mar-12,13,14,18,Oct04,05,12(4)]
Process: (1) The program in execution is known as Process. It is also known as job. When
the program is loaded in main memory, then it became process. (2) In multiuser or
multitasking operating system, multiple processes are executed from different programs at a
time. The process management of such OS keeps track of all running processes, schedules
them and dispatches them one by one.
Process Management: (1) A program in execution is known as process. (2) The process
management of operating system manages processes, enable processes to share information,
protect process resources and allocate system resources to processes. (3) Some of the system
services (or calls) provided under information management.
(a) Read a process (b) Block a process (c) Resume a process (d) Terminate a process (e)
Suspend a process (f) Delay a process (g) Change the priority of the process (h) Generate a
process.
Ready State: (1) A process will be in ready state after it is loaded into the main memory and
is ready for execution. In ready state, the process waits for its execution by the processor. (2)
In multiprogramming environment, many processes may be present in the ready state. (3) A
ready queue is used in computer scheduling to contain all the processes, which are in ready
states. The process in this state is
waiting to be assigned to a processor.
P ag e |9
Computer Science ( D9) : XII - Paper –I
Block State: (1) A process moves from running state to block state if it requires some
blocked resource during its execution. (2) After the resource becomes available, the process
moves to the ready state again. (3) The blocked process cannot be directly scheduled even if
CPU is free.
Multi-programming system:
(1) The system in which two or more programs (or jobs) are loaded in main memory and
ready to execute is known as multiprogramming system. (2) Only the running program can
execute its instruction at a time on CPU, while all the others are waiting for their turn. (3) It
increases utilization of CPU. CPU always has a program to be executed. (4) When a running
program is waiting for input output operation, OS allocates a CPU to another ready program,
instead of allowing the CPU to be idle.
Context Switching: (1) In multiprogramming system, if the running process is waiting for an
event such as I/0 operations, CPU executes another process and vice versa. (2) It increases
utilization of CPU. CPU always has a program to be executed. (3) The time required by the
CPU to switch from one process to another is known as context switching. (4) In other words,
the lose in time in turning the attention of CPU from one process to another is known as
context switching. Consider the following figure
(5) Consider the two processes "A" and "B", they are ready to execute and require CPU time
for execution.
// Process A // Process B
#include<iostream.h> #include<iostream.h>
void main() void main()
{ inta,b,c; { inta,b,c;
a= 10; a= 10;
b = 20; b = 20;
c=a+b; c=a*b;
cout<< "sum="<< c; cout<< "product="<< c;
} }
(6) Let CPU time is given to process A, which is having some instruction for I/O event, and
then OS halts the execution of process A and gives CPU time to process B to execute. Hence
the context switching is the time taken by the CPU to turn attention from process A to
process B. (7) During context switching, CPU doesn't do anything and remain Idle.
P a g e | 10
Computer Science ( D9) : XII - Paper –I
Q18. Explain following terms in case of Process Scheduling:i) Turn-around Time ii)
Waiting Time iii) Terminal Response Time iv) Event Response Time.Mar 05,18,
Oct08,09(4)
(1) Turnaround Time: The time duration between the submission of a job to a computer
system for processing and the completion of the job is known as Turnaround time.
(2) Waiting Time: The time which a newly admitted job spends waiting in the waiting queue
for the operating system to allocate resources to it before its execution is known as Waiting
Time.
(3) Terminal Response Time: The time interval from the time of submission of a job to the
system for processing to the time the first response for the job is produced by the system is
known as Terminal response time.
(4) Event Response Time: The time to respond with an event in the real-time system is
known as Event Response Time.
Q19 With reference to process management, explain the terms. (i) External Priority (ii)
Purchase Priority (iii) Internal Priority (iv) Time Slice[Mar06,08,10,11,16,17,19,0ct10(4)]
Priority of process: (1) Priority is a policy by which the ready processes can be arranged in
a queue to dispatch for execution. (2) Concept of priority is used to decide which process gets
the CPU first for execution. (3) The process priority can be of following types. (i) External
Priority (ii) Purchase Priority (iii) Internal Priority (iv) Time Slice
(i) External Priority: (1) The priority which is decided by the user externally at the
time of initiating the process is known as External Priority. (2) If user does not
specify any external priority, the OS uses default priority.
(ii) Internal Priority: (1) The priority decided by the scheduling algorithm of OS is
known as internal priority. (2) The following scheduling algorithms are used for
internal priority decision. (a) Shortest Job First (SJF) (b) First come First Serve
(FCFS) (c) Round Robin algorithm (d) Early Deadline First (EDF) algorithm etc.
(iii) Purchase Priority: (1) If a process is charged to give higher priority, it is known
as purchase priority. (2) It prevents each user from firing his job at the highest
priority. (3) OS keeps track of the time used by each process and the priority at
which it was used.
(iv) Time Slice: (1) In Time Sharing System, each process has given a time span to
run its task irrespective of its important. This time span is known as Time Slice,
Time Slot, or Quantum. (2) In each time slice the processes get the CPU attention
turn by turn. (3) If the time slice is over, the process is sent back to the ready
queue for its next turn.
Q20. Explain the term Multi-tasking with suitable example. OR Explain time sharing
related to process management of operating system. ORExplain multiuser and time
sharing operating systems. Oct03,13(4), Mar 15,(3),20(3)
Multitasking Operating system: (1) The system that works with more than one program or
task simultaneously is known a! Multi-Tasking Operating System. (2) Generally it is time
sharing system. Each process has given a time slice to execute task and then the chance is
given to another process and so on and loop will be continued. (3) It uses different scheduling
P a g e | 11
Computer Science ( D9) : XII - Paper –I
(3) CPU selects a process "A" for execution from ready queue, and set a timer. After
completion of time slice, the process "A" will be removed. If the process "A" is not finished it
will add in the tail of the queue and CPU selects process "B". In this way, the process is
going on.
(4) The Ongoing queue is managed like circular queue. Multi-User Operating system: (1)
Multi-User OS allows two or more users to run programs at the same time.(2) Some
operating systems permit hundreds or even thousands of concurrent users. (3) The Multiuser
operation system can be multitasking OS or multiprocessing OS. (4) In Multi-user, Multi-
tasking OS, Multiple tasks can be performed by OS at a time. (5) It generally uses time
sharing system to divide the CPU time among the users.
Main function of Memory Management: The main functions performed by the memory
management module are as follows. (1) To Keep track of all memory locations free o' r
allocated and if allocate, to which process and how much memory is allocated. (2) To decide
memory allocation policy i.e. which process should get how much memory and where. (3) To
allocate memory to process when they need it and de-allocate when they are done. (4) To use
various techniques and algorithms to allocate and de-allocate memory locations.
The following are memory management system.
(i) Contiguous, Real Memory Management System
(a) Single contiguous (b) Fixed contiguous (c) Variable partitioned
(ii) Non-Contiguous, Real Memory Management System (a) Paging (b) Segmentation (c)
Combined (Paging & Segmentation)
P a g e | 12
Computer Science ( D9) : XII - Paper –I
Q22. Explain memory map of single user operating system. Explain single contiguous
and fixed partitioned memory management systems with a suitable memory mapping
diagram. Mar 04,05,11,20(3),0ct10(4)
Fixed Partitions: (1) In partitioning, when the main memory of the system is divided into
multiple parts, with fixed sizes, it is known as fixed partitioning and these parts are known as
fixed partitions or static partitions. (2) The sizes of the partitions may be same or different but
they are fixed.
Variable Partitions: (1)In variable partitioning number of partitions and their sizes are
variables. (2) Variable partitions are not decided at the time of system generation. The
P a g e | 13
Computer Science ( D9) : XII - Paper –I
partitions are created at run-time therefore it is also known as Dynamic partitioning. (3) The
number, sizes and locations of the partitions are varied dynamically as process are loaded and
terminated.
Q24. State various steps involved in allocation of a partition in case of fixed partition
memory management. Mar06,07,17,0ct03,10,12(4)
Fixed Partitions (Static Partitions):
(1) In partitioning, when the main memory of the system is divided into multiple parts. with
fixed sizes, it is known as fixed partitioning and these parts are known as fixed partitions or
static partitions. (2) The sizes of the partitions may be same or different but they are fixed. (3)
The partitions, in fixed partitioning, are decided at the time of system generation. (4) In fixed
partitions, the maximum number of processes that can be loaded in main memory is fixed. ie.
degree of multiprogramming is bounded by the number of partitions. (5) If the system has n-
number of partitions, then only n-processes can be loaded in the memory simultaneously.
(6) Each partition will contain exactly one process. User cannot load more task than the
number of partitions available. The process gets the chance to entry into main memory as
soon as the partition with appropriate size is free. After completion of execution and
termination of a process the particular partition will be de-allocated. The partition will be
allocated to the next process. The fixed partition memory management schemes suffer from
internal fragmentation
Q25. Explain paged memory management system with a suitable Page Map Table
(PMT). Mar 10, Oct 04, 08, 15, Jul 16(4)
Paging: (1) If the physical memory of the computer is divided into small-size memory blocks
called page frame, and the program to be loaded in memory is also divided into same size
blocks called pages, then this scheme is known as paging. (2) Paging permits memory of a
program to be non-contiguous which allows a program to be allocated physical memory
wherever available. (3) The physical memory is partitioned into fixed-sized small blocks
called page frame. (4) Similarly the program to be loaded is also divided into same size
blocks called pages.(5) Then these pages of the programs are loaded into page frame of
physical memory. 16) The pages of the program can be loaded into non-contiguous memory
blocks. (7) The page map Table (PMT) contains logical page number of the program and
allocated page frame to those pages. The page number is used as an index into PMT.
P a g e | 14
Computer Science ( D9) : XII - Paper –I
(8) The page size is defined by the hardware at the time of system generation. It is typically
power of 2.
Segmentation: (1) The computer program can be divided into logical parts. Each part is
called segment. (2) The segments of the program can be of different sizes. All of which are
loaded into memory at run time, though not necessarily contiguously. (3) Each segment has
its own index and length (or size). (4) There is no simple relationship between logical
addresses and physical address in segmentation. Information about logical and physical
address of segments are stored in a special table called Segment Table. (5) Each program can
be considered to be consisting of different segments such as code, data, stack etc. Each of
these can be further divided into new segments. (6) The segment Table maps two
dimensional logical address into one dimensional physical address. Each segment table
consists of Base address of each segments and limits (length of the segments). Consider the
following example.
(7) In main memory, we only store the segments of the process. Process segment table is used
to keep the record of segments, its size, and its memory address.
(8) The basic difference between paging and segmentation is that a page is always of fixed
size block whereas a segment is of variable sizes.
(9) The size of the pages in paging is predefined while the sizes of segments are decided by
the user.
P a g e | 15
Computer Science ( D9) : XII - Paper –I
External Fragmentation: (1) A situation when enough total free memory space exists to
satisfy the memory need of a process, but still the process cannot be loaded because the
available free memory is not contiguous, it is known as External Fragmentation. (2)
Generally the problem of external fragmentation occurs in portioned memory management
system. (3) Example: Fixed partition memory, variable partition memory etc.
Internal Fragmentation: (1) A situation when a process is allocated more memory than its
actual memory requirement is known as Internal Fragmentation. (2) The additional memory
allocated to the process remains unutilized because it is neither used by the process nor it can
be allocated to any other process for use. (3) Example: Paging, segmentation etc.
Q28. What is Virtual Memory? Explain any three terms related to virtual memory. OR
Explain the following concept of Virtual Memory: (1) Page Fault (2) Demand paging (3)
Page Replacement Policy(4) Locality of Reference (5) Working Set (6) Dirty Page (7)
Dirty bit. Mar 04, 15, 16(4)
Virtual Memory: (1) Virtual Memory Management allows the portion of the hard disk to be
considered as a part of the main memory. This portion of hard disk is known as virtual
memory. (2) It allows the program to be loaded to start execution even though there is no
sufficient memory to load entire program. (3) It also allows the program to be loaded which
is larger than the actual physical memory size of the computer. (4) It also allows having
memory protection, because each virtual address is translated to a physical address. (5) There
are two most common methods of implementation of virtual memory; paging and
segmentation. (6) Following are the concept related to virtual memory management.
P a g e | 16
Computer Science ( D9) : XII - Paper –I
Q29. What is GUI? Explain in brief any two features of GUI. OR Explain any six basic
GUI features.OR What is GUI? State any four advantages of GUI. Oct03, 06(3), 07 Mar
05(3),12,Jul 17(3)
GUI (Graphical User Interface): (1) GUI stands for Graphical User
Interface. (2) GUI is a type of user interface that allows users to interact with
Computer with images or icons rather than text commands. (3) GUI objects
include icons, cursors and buttons. (4) It allows the use of hand held device
such as mouse etc. (5) Windows is GUI based operating system.
Advantages of GUI: (1) The textual commands are replaced by graphics. (2)
User does not need to remember difficult text commands. (3) GUI is much
easier to learn and easier to use. (4) User can run several programs at a time.
(5) Data can be share from one program to another program. (6) Person with
no computer knowledge can perform basic operation using GUI.
Features of GUI: (1) Icons: Text command is replaced by graphical icons. (2)
Pointing Device: Hand held devices (e.g. mouse) can be used with GUI that
which is not possible with character user interface (CUI). (3) Windows: GUI allows the use
of programs or application as Windows. (4) Menus: GUI includes menus which allow users
to select command using menu items. (5) Drag and Drop: 'Cut and Paste', Drag and drop
operations can be easily done in GUI. (6) Attractive: GUI is attractive and pleasing to the
eyes. (7) Interactive Objects: Objects of GUI change color, size or visibility when the user
interacts with them. (8) Single Click: Users can use single click to select a particular process.
(9) Double Click: Users can double click to start and application.
Q30. What is GUI? Explain any two essential components of GUI. OR Define GUI.
Explain Menu Bar and Scroll Bar.
OR Explain the function of menu bar and scroll bar components of GUI.
OR Explain three components of MS Windows. 1) Menu Bar 2) Title Bar 3) Scroll Bar
4) Task Bar5) Minimize Button 6) Maximize Button 7) Close Button [Mar 07,18) Oct 08]
GUI (Graphical User Interface): (1) GUI stands for Graphical User Interface. (2) GUI is a
type of user interface that allows users to interact with Computer with images or icons rather
than text commands.
P a g e | 17
Computer Science ( D9) : XII - Paper –I
Essential Components of GUI: Some of the essential components of GUI are as follows.
1) Menu Bar 5) Minimize Button Menu Bar:
2) Title Bar 6) Maximize Button
3) Scroll Bar 4) Task Bar 7) Close Button
Menu Bar: (1) Menu bar is one of the most essential components of windows. (2) Menu bar
contains labels for different menus. Essential functions of the program are categorized in
Menus as options. (3) Some commonly menus are File, Edit, View, Window, Help etc
Title Bar: (1) Title bar is small strip which appears at the top of the window. (2) Title bar
displays the title of window and includes control box (min, max, close button).
Scroll Bar: (1) Generally there are two scroll bars, horizontal scroll bar and vertical scroll
bar. (2) Scroll bar is used to scroll the window are vertically and horizontally. (3) Scroll bar
contains slider box, which allows to working are to be positioned on screen.
Taskbar: (1) Generally, a Taskbar shows the running program and all the opened programs.
(2) Taskbar is a strip located at the bottom edge of the screen. (3) Generally it contains a start
button in Windows OS.
Close Button: It is one button of control box of window. It allows a window to be closed.
Q31. Explain in brief the following programs of MS-Windows. (i) Program Manager (ii)
File Manager (iii) Control Panel Mar 03,07,09,13(3)
Program Manager: (1) Program manager has all the executable files of every application
and program. (2) It starts executing along with MS-Windows. (3) Program manage is the
P a g e | 18
Computer Science ( D9) : XII - Paper –I
main window of MS Windows 3.x. (4) Basically it allows users to select and run program on
operating system. (5) Program manager is still available in all versions of MS windows e.g.
Windows 95,98 NT, 2000 or XP.
File Manager: (1) File Manager Window enables you to display and manage you files and
folders. (2) It allows user to traverse through the file system and change drives. (3) It also
allows searching, copy and pasting, moving, creating or deleting files and folders. (4) It
allows application to be started directly by double clicking on it.
Control Panel: (1) Control panel is used to view and change system settings. (2) It is used to
add or remove hardware and software. (3) It is used to change display setting of applications,
such as background, border color/width, cursor size and shape etc. (4) It includes controlling
user accounts, changing accessibility options and N/W setting. (5) It is used to configure
printers and other ports on the PC.
Q32 Define Security. Explain the different elements of security. OR. Explain the
following elements of data security. (i) Confidentiality (ii) Integrity (iii) Availability Mar
05, 18 Oct 04,06,08,12,10(3),15(3)
Security: (1) Security -refers to providing a protection to the program and data stored in
memory. (2) Security is a protection from unauthorized access to the system resources such
as memory and other devices, (3) In multiuser operating system, the concept of security is
very important. (4) The system which provides access to information to only properly
authorized user or processes. (5) There are following three main elements of security:
Confidentiality: (1) Confidentiality is permitting approved users to access all confidential
information. (2) It ensures that information is not accessed in an unauthorized manner. (3) It
is generally related to the read operation.
Integrity: (1) It ensures that the information is not modified or deleted by an unauthorized
manner. (2) It is generally related to write operation.
Availability: (1) Availability ensures timely and reliable access to information. (2) In other
words, information is available to authorized users at right time.
Q33. Explain in brief any three ways by which a system can be attacked, and
Penetrated. Mar10,0ct05,09,Ju116,18(3)
Attacked on System:The secured system can be attacked and penetrated by the following
ways
(1) Authentication: Unauthorized user can be penetrated in the secure system by stealing
password, by guessing password using trial and error method, etc.
(2) Browsing: One can browse the system file with access controls, to get the information,
after which, unprotected data file could be read or modified.
(3) Line Tapping: To access the confidential data, special equipment’s are used to tap into a
communication line.
(4) Waste recovery: Wastage or damage hard disk can be recovered to access confidential
data. Some technique can also be used to recover passwords.
(5) Rough Software: Rough software such as viruses or worms can be used to attack the
system.
(6) Trap doors: Trap doors provide secretes methods of gaining access to an application or
operating system. Trap doors are also known as back doors.
P a g e | 19
Computer Science ( D9) : XII - Paper –I
Q35. What is Computer Virus? State various types of viruses and the basis on which
they are classified. [Mar02,05,06,07,10,11,17,20,0ct07,15,]u117]
Computer Virus:
(1) Virus is a piece of computer code designed intentionally to infect other program. (2)
Virus is not a complete program by itself. It requires a host program to execute. (3) It is
malware attached to another program, which can replicate and spread after an initial
execution on target system. (4) It causes direct harm to the system. It can infect programs and
data. (5) There are following types of viruses based on where and what do they affect. (i)
boot sector virus (ii) Memory resident virus (iii) File specific virus (iv) Command processor
virus (v) General purpose virus
Q36. What is a Virus? Write any three infecting methods of Virus. OR What is
Computer Virus? State any four methods by which a virus can affect other programs.
[Mar02,05,06,07,10,11,17,20,0ct07,15,Ju117]
Computer Virus:
(1) Virus is a piece of computer code designed intentionally to infect other programs. (2)
Virus is not a complete program by itself. It requires a host program to execute. (3) It is
malware attached to another program, which can replicate and spread after initial execution
on target system. (4) It causes direct harm to the system. It can infect programs and data.
P a g e | 20
Computer Science ( D9) : XII - Paper –I
Q37. Discuss virus detection, removal and prevention philosophies OR Explain the
function of the following Antivirus Programs: i) Virus Detection ii) Virus Removal iii)
Virus Prevention
Worm Virus
1) Computer Worm is a complete program by Computer Virus is not a complete program
itself. by itself.
2) It does not need to attach itself to other It requires a host program to execute.
program in order cause damage.
3) A computer worm is a malware that Virus is a piece of computer code designed
spreads copies of itself from computer to intentionally to infect other program.
computer.
4) A computer worm can potentially bring It can corrupt programs and data.
the entire network to a grinding It causes
direct harm to the system.
5) Types of worms (a) Intelligent (b) Dumb Types of Virus (a) Boot Sector Virus (b)
Worms Memory resident virus (c) File Specific virus
P a g e | 21
Computer Science ( D9) : XII - Paper –I
P a g e | 22
Computer Science ( D9) : XII - Paper –I
P a g e | 23