0% found this document useful (0 votes)
2 views

OS Assignment 1

This document is a tutorial sheet for an Operating Systems course, outlining various questions and topics for discussion, including the role of applications in operating systems, the advantages of timesharing systems, security issues in multiprogramming environments, and differences between various computing architectures. It also addresses memory protection mechanisms, privileged instructions, and challenges in real-time operating system development. The submission deadline for the tutorial is set for February 17, 2025.

Uploaded by

Shubham
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

OS Assignment 1

This document is a tutorial sheet for an Operating Systems course, outlining various questions and topics for discussion, including the role of applications in operating systems, the advantages of timesharing systems, security issues in multiprogramming environments, and differences between various computing architectures. It also addresses memory protection mechanisms, privileged instructions, and challenges in real-time operating system development. The submission deadline for the tutorial is set for February 17, 2025.

Uploaded by

Shubham
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Last Date for Submission: 17 Feb 2025

Operating Systems [CSE202]


Tutorial Sheet 1.1

1.Keeping in mind the various definitions of operating system, consider whether the operating
system should include applications such as web browsers and mail programs. Argue both that
it should and that it should not and support your answers.
2. Under what circumstances would a user be better off using a timesharing system than a PC
or a single-user workstation?
3. In a multiprogramming and time-sharing environment, several users share the system
simultaneously. This situation can result in various security problems
a. What are two such problems?
b. Can we ensure the same degree of security in a time-shared machine as in a dedicated
machine? Explain your answer.
4. Describe the differences between symmetric and asymmetric multiprocessing. What are
three advantages and one disadvantage of multiprocessor systems?
5. How do clustered systems differ from multiprocessor systems? What is required for two
machines belonging to a cluster to cooperate to provide a highly available service?
6. Consider a computing cluster consisting of two nodes running a database. Describe two ways
in which the cluster software can manage access to the data on the disk. Discuss the benefits
and disadvantages of each.
7. How are network computers different from traditional personal computers? Describe some
usage scenarios in which it is advantageous to use network computers.
8. What are the main difficulties that a programmer must overcome in writing an operating
system for a real time environment?
9. What is the purpose of interrupts? How does an interrupt differ from a trap? Can traps be
generated intentionally by a user program? If so, for what purpose?
10. Describe a mechanism for enforcing memory protection in order to prevent a program from
modifying the memory associated with other programs.
11. Which of the following instructions should be privileged?
a. Set value of timer.
b. Read the clock.
c. Clear memory.
d. Issue a trap instruction.
e. Turn off interrupts.
f. Modify entries in device-status table.
g. Switch from user to kernel mode.
h. Access I/O device
12. Some early computers protected the operating system by placing it in a memory partition
that could not be modified by either the user job or the operating system itself. Describe two
difficulties that you think could arise with such a scheme.
13. Some CPUs provide for more than two modes of operation. What are two possible uses of
these multiple modes?

You might also like