0% found this document useful (0 votes)
16 views2 pages

OS IA 3 Question Bank

Uploaded by

2405samrudhi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views2 pages

OS IA 3 Question Bank

Uploaded by

2405samrudhi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

RN SHETTY TRUST®

RNS INSTITUTE OF TECHNOLOGY


Autonomous Institution Affiliated to VTU, Recognized by GOK, Approved by AICTE
(NAAC ‘A+ Grade’ Accredited, NBA Accredited (UG - CSE, ECE, ISE, EIE and EEE)
Channasandra, Dr. Vishnuvardhan Road, Bengaluru - 560 098
Ph:(080)28611880,28611881 URL: www.rnsit.ac.in
DEPARTMENT OF CSE (DATA SCIENCE)

OPERATING SYSTEMS QUESTION BANK IA-3

Module 4
Q.
No. Questions

1 Distinguish between First Fit, Best Fit and Worst Fit algorithms.

2 Explain Internal Fragmentation and External Fragmentation.

3 Explain paging and page table in detail

4 Explain Demand paging in detail.

5 Explain the working of paging hardware with Translation Look-aside buffer.


6 Explain Hierarchical Page table, Hashed Page table and Inverted Page table
7 Explain copy-on-write process in virtual memory.

8 What is a page fault? With the supporting diagram explain the steps involved in handling page fault.
9 Explain thrashing and Working Set model.
10 Explain Segmentation concept and hardware with a neat diagram
11 Explain the different implementations (Stack based and Counter based) of LRU Page Replacement
algorithm.
12 Explain the concept of Belady’s Anomaly.
13 Problems based on Page Tables and Page Replacement Algorithms also included.

Module 5
Q.
No. Questions
1 What is a file? Explain typical file control block, with diagram.
2 Explain the different file allocation methods by taking an example with neat diagram. List the
advantages and disadvantages.
3 Explain free space management in disks.
4 Distinguish between single level directory structure and two-level directory structures. What are its
advantages and disadvantages?
5 Distinguish between Tree Structured, Acyclic Graph and General graph directory structures.

Page | 1
6 Explain different methods of implementing the access matrix.

Explain the access matrix model of implementing protection in operating system.


7

8 Explain the different file access methods.

9 Explain the various file attributes and file operations.

Explain the Domain of Protection


10
11 Explain the various mechanisms of implementing file protection.
12 Problems based on Disk Scheduling Algorithms also included.

Page | 2

You might also like