OS Assignment 1
OS Assignment 1
1.Keeping in mind the various definitions of operating system, consider whether the operating
system should include applications such as web browsers and mail programs. Argue both that
it should and that it should not and support your answers.
2. Under what circumstances would a user be better off using a timesharing system than a PC
or a single-user workstation?
3. In a multiprogramming and time-sharing environment, several users share the system
simultaneously. This situation can result in various security problems
a. What are two such problems?
b. Can we ensure the same degree of security in a time-shared machine as in a dedicated
machine? Explain your answer.
4. Describe the differences between symmetric and asymmetric multiprocessing. What are
three advantages and one disadvantage of multiprocessor systems?
5. How do clustered systems differ from multiprocessor systems? What is required for two
machines belonging to a cluster to cooperate to provide a highly available service?
6. Consider a computing cluster consisting of two nodes running a database. Describe two ways
in which the cluster software can manage access to the data on the disk. Discuss the benefits
and disadvantages of each.
7. How are network computers different from traditional personal computers? Describe some
usage scenarios in which it is advantageous to use network computers.
8. What are the main difficulties that a programmer must overcome in writing an operating
system for a real time environment?
9. What is the purpose of interrupts? How does an interrupt differ from a trap? Can traps be
generated intentionally by a user program? If so, for what purpose?
10. Describe a mechanism for enforcing memory protection in order to prevent a program from
modifying the memory associated with other programs.
11. Which of the following instructions should be privileged?
a. Set value of timer.
b. Read the clock.
c. Clear memory.
d. Issue a trap instruction.
e. Turn off interrupts.
f. Modify entries in device-status table.
g. Switch from user to kernel mode.
h. Access I/O device
12. Some early computers protected the operating system by placing it in a memory partition
that could not be modified by either the user job or the operating system itself. Describe two
difficulties that you think could arise with such a scheme.
13. Some CPUs provide for more than two modes of operation. What are two possible uses of
these multiple modes?