Assignment
Assignment
11. What is deadlock? State the conditions necessary for deadlock to exist. How can you
represent a deadlock? Explain with suitable example.
12. Describe various methods for deadlock prevention?
13. Explain Resource Allocation Graph in detail.
14. Assume that there are three resources, A, B, and C. There are 4 processes P0 to P3. At
T0 we have the following snapshot of the system:
a. What is the content of the matrix need and Total Resource Vector?
b. Is the system in a safe state?
15. Explain the term logical address and physical address.
16. Describe fragmentation with example.
17. What is paging? Describe types of page tables.
18. Consider the following page reference string: 1,2,3,4,2,1,5,6,2,1,2,3,7,6,3,2,1,2,3,6.
How many page faults would occur for the FIFO, LRU and optimal page replacement
algorithm? Assuming four frames, remember all frames are initially empty.
19. Given five memory partitions of 100KB, 500KB, 200KB, 300KB and 600KB (in
order), how would each of the first-fit, best-fit and worst-fit algorithms place processes
of 212KB, 417KB, 112KB and 426KB (in order)? Which algorithm makes the most
efficient use of memory?
20. Describe the term programmed driven I/O and Interrupt driven I/O.
21. What is DMA? Write the working procedure of DMA.
22. Define the term seek time and rotational delay in disk scheduling. Suppose that a disk
has 100 cylinders, numbered 0 to 99. The drive is currently serving a request at cylinder
43 and previous request was at cylinder 25. The queue of pending request, in FIFO
order is: 86, 70, 13, 74, 48, 9, 22, 50, 30.
Starting from the current head position, what is total distance (in cylinders) that the disk
arm moves to satisfy all pending request for each of following disk scheduling
algorithm.
a. FCFS b. SSTF c. SCAN d. LOOK
23. What is file? Write down their importance in operating system.
24. What is file types? Describe file types used in operating system.
25. Explain different structure of directories.
26. Why access protection is necessary in file systems? How protection can be
implemented by the identity of the users?
27. What do you mean by user Authentication? Explain various user authentication
methods with example.
28. How can we secure our system? Explain.
29. What is distributed operating system? Describe its features.
30. Describe types of clock synchronizations with examples.
31. Perform CASE Study on windows and Linux operating system (must include history,
features, advantages and disadvantages of each operating system).