Day 4 - Session 3
Day 4 - Session 3
Strictly for personal use only This training material is only an indicative but not exhaustive
1
Pre-Examination Training material for Specialist Cadre Officers Exam
System Calls
Definition: System calls provide an interface for programs to request services from the operating
system. They allow user-level processes to communicate with the kernel.
Examples:
• Process: An instance of a program in execution, which has its own memory space. Each
process has a unique Process ID (PID).
• Thread: A lightweight process that shares the same memory space as other threads within
the same process. Threads enable parallel execution within a program.
Definition: IPC allows processes to communicate and synchronise their actions. Common IPC
mechanisms include:
• Concurrency: The ability of the operating system to manage multiple processes or threads
simultaneously.
• Synchronisation: Mechanisms (like mutexes and semaphores) to control access to shared
resources to prevent data inconsistency.
Strictly for personal use only This training material is only an indicative but not exhaustive
2
Pre-Examination Training material for Specialist Cadre Officers Exam
Deadlock
Definition: A situation where two or more processes are unable to proceed because each is
waiting for the other to release resources. Prevention strategies include resource ordering and
deadlock detection algorithms.
Memory Management
Definition: The process of managing computer memory, allocating space to processes, and
keeping track of each byte in a computer’s memory.
Virtual Memory
Definition: A memory management technique that creates an illusion of a large memory space by
using disk space to extend the physical memory. It allows for more processes to be run
simultaneously.
• Method: The first process in the queue gets executed first. Simple but can lead to long
wait times (convoy effect).
• Method: The process with the smallest execution time is scheduled next. Minimises
average waiting time but requires knowledge of future process times.
• Method: Pre-emptive version of SJF. The process with the least remaining time is
executed next.
• Method: Each process is assigned a fixed time slice (quantum) in a cyclic order. Fair and
suitable for time-sharing systems.
Strictly for personal use only This training material is only an indicative but not exhaustive
3
Pre-Examination Training material for Specialist Cadre Officers Exam
D. Types of Memories
Cache Memory
Definition: A small-sized type of volatile memory that provides high-speed data access to
the CPU. It stores frequently accessed data to speed up processing.
Definition: The primary storage used by the CPU to hold data and instructions currently in
use. It is volatile and loses its content when power is turned off.
Secondary Storage
Definition: Non-volatile storage that retains data even when powered off. Examples
include Hard Disk Drives (HDDs) and Solid State Drives (SSDs).
Paging
Definition: A memory management scheme that eliminates the need for contiguous
allocation of physical memory. Memory is divided into fixed-size units called pages.
• Method: Serves requests in the order they arrive. Simple but can be inefficient.
• Method: Serves the closest request next, minimizing movement of the disk arm.
Strictly for personal use only This training material is only an indicative but not exhaustive
4
Pre-Examination Training material for Specialist Cadre Officers Exam
• SCAN: The disk arm moves in one direction servicing requests until it reaches the end,
then reverses direction.
• LOOK: Similar to SCAN but only goes as far as the last request in each direction.
• C-SCAN: The disk arm moves in one direction and, upon reaching the end, jumps
back to the beginning.
• C-LOOK: Like C-SCAN but only goes to the last request in one direction before
jumping back
Backup and recovery processes are vital for ensuring data integrity and availability. They protect against
data loss due to hardware failures, accidental deletions, cyberattacks, and natural disasters. A well-defined
backup strategy can minimise downtime and data loss, thus supporting business continuity.
Types of Backups
1. Full Backup:
o Description: A complete copy of all data and system files.
o Advantages: Simplifies recovery; restores all data in one operation.
o Disadvantages: Time-consuming and storage-intensive.
2. Incremental Backup:
o Description: Backs up only the data that has changed since the last backup (full or
incremental).
o Advantages: Faster and requires less storage space.
o Disadvantages: Recovery requires the last full backup and all subsequent incremental
backups, making it more complex.
3. Differential Backup:
o Description: Backs up all data changed since the last full backup.
Strictly for personal use only This training material is only an indicative but not exhaustive
5
Pre-Examination Training material for Specialist Cadre Officers Exam
o Advantages: Faster recovery than incremental backups, as only the last full backup and
the last differential backup are needed.
o Disadvantages: Takes more time and storage than incremental backups as more data
accumulates.
Backup Strategies
• 3-2-1 Rule: Maintain three total copies of your data, two of which are local but on different
devices, and one off-site.
• Automated Backups: Use software tools to schedule regular backups, reducing human error.
• Testing Restores: Regularly test backup files to ensure data integrity and successful restoration.
Recovery Processes
Implementing robust security and compliance controls is essential for protecting sensitive data, meeting
regulatory requirements, and maintaining the trust of stakeholders.
1. Access Control:
o Role-Based Access Control (RBAC): Limit access to data based on user roles. Ensure
that users only have the minimum privileges necessary for their tasks.
o Multi-Factor Authentication (MFA): Add an extra layer of security beyond passwords,
requiring additional verification (e.g., a mobile device).
2. Data Encryption:
o Encrypt sensitive data at rest (stored data) and in transit (data being transmitted) to protect
against unauthorised access.
3. Regular Security Audits:
o Conduct periodic audits to assess vulnerabilities, ensuring compliance with security
policies and regulatory requirements.
4. Incident Response Plan:
o Develop and maintain a plan to identify, respond to, and recover from security incidents.
Regularly test and update the plan.
Strictly for personal use only This training material is only an indicative but not exhaustive
6
Pre-Examination Training material for Specialist Cadre Officers Exam
Compliance Controls
• Regulatory Frameworks: Adhere to industry standards and regulations, such as GDPR, HIPAA,
and PCI-DSS, which dictate data handling and protection practices.
• Documentation: Maintain thorough documentation of security policies, procedures, and
compliance efforts to demonstrate adherence to regulations.
• Employee Training: Conduct regular training sessions to ensure employees are aware of security
protocols and best practices.
• Architecture: Unix/Linux is a multi-user, multitasking operating system known for its robustness
and flexibility. It can be run on various hardware architectures.
• File System: Common file systems include ext4 (Linux) and UFS (Unix), providing features like
file permissions, symbolic links, and hierarchical directory structures.
• Command Line Interface (CLI): The shell (e.g., Bash, Zsh) is a powerful command-line
interface that allows users to execute commands, write scripts, and automate tasks.
• User Management: Unix/Linux employs a user/group permission model for file access control.
Users have unique IDs, and permissions are set at the file level (read, write, execute).
Key Differences
Strictly for personal use only This training material is only an indicative but not exhaustive
7
Pre-Examination Training material for Specialist Cadre Officers Exam
Strictly for personal use only This training material is only an indicative but not exhaustive
8
Pre-Examination Training material for Specialist Cadre Officers Exam
Strictly for personal use only This training material is only an indicative but not exhaustive
9
Pre-Examination Training material for Specialist Cadre Officers Exam
Strictly for personal use only This training material is only an indicative but not exhaustive
10
Pre-Examination Training material for Specialist Cadre Officers Exam
Strictly for personal use only This training material is only an indicative but not exhaustive
11
Pre-Examination Training material for Specialist Cadre Officers Exam
Strictly for personal use only This training material is only an indicative but not exhaustive
12
Pre-Examination Training material for Specialist Cadre Officers Exam
E) Assured
Answer: E
32. In Windows, which service is used for user management?
A) User Control Panel
B) Active Directory
C) User Authentication Service
D) System Management
E) Group Policy Management
Answer: B
33. Which scheduling algorithm allocates a fixed time slice for each
process?
A) FCFS
B) Shortest Job First
C) Round Robin
D) Priority Scheduling
E) Multilevel Queue
Answer: C
34. Which mechanism helps prevent race conditions in concurrent
programming?
A) Paging
B) Synchronisation primitives
C) Process spawning
D) Resource allocation
E) Thread pooling
Answer: B
35. What is the primary purpose of a disaster recovery plan?
A) To increase storage capacity
B) To outline steps for recovering from a disaster
C) To manage daily operations
D) To implement security protocols
E) To upgrade hardware
Answer: B
36. Which of the following is NOT a characteristic of cache memory?
A) High speed
B) Volatile
C) Large capacity
D) Temporary storage
E) Closer to the CPU
Answer: C
37. What does FIFO stand for in page replacement algorithms?
A) First In, First Out
B) Fixed Input, Fixed Output
C) Fast Input, Fast Output
D) First Implemented, First Offered
Strictly for personal use only This training material is only an indicative but not exhaustive
13
Pre-Examination Training material for Specialist Cadre Officers Exam
Strictly for personal use only This training material is only an indicative but not exhaustive
14
Pre-Examination Training material for Specialist Cadre Officers Exam
E) Synthetic Backup
Answer: B
44. What is the primary role of a resource manager in an operating
system?
A) Control CPU scheduling
B) Manage storage allocation
C) Track resource usage
D) Handle user interfaces
E) Monitor network traffic
Answer: C
45. What does the term 'data encryption' refer to?
A) Reducing data size
B) Transforming data into a secure format
C) Creating backups
D) Recovering lost data
E) Organizing data
Answer: B
46. Which operating system feature allows users to run multiple
applications simultaneously?
A) Single-tasking
B) Multithreading
C) Multitasking
D) Batch processing
E) Resource allocation
Answer: C
47. What is the main disadvantage of the FCFS scheduling algorithm?
A) High complexity
B) Increased wait time for shorter processes
C) Requires extensive memory
D) Difficult to implement
E) Inefficient for interactive systems
Answer: B
48. What is a primary advantage of using virtual memory?
A) Increased speed of processes
B) Reduced physical memory requirements
C) Enhanced data security
D) Simpler memory management
E) Increased data storage
Answer: B
49. Which type of system call allows a process to wait for another
process to finish execution?
A) fork()
B) wait()
C) exec()
Strictly for personal use only This training material is only an indicative but not exhaustive
15
Pre-Examination Training material for Specialist Cadre Officers Exam
D) exit()
E) close()
Answer: B
50. What does the term 'concurrency' refer to in operating systems?
A) Running multiple processes at the same time
B) Ensuring data security
C) Managing memory allocation
D) Synchronizing threads
E) Allocating CPU time
Answer: A
Strictly for personal use only This training material is only an indicative but not exhaustive
16