Os Unit 4 Questions
Os Unit 4 Questions
Identifier
Name
Type
Location
Size
Protection
Time
Date
User identification
3) What are the various file operations? (NOV/DEC 2012, APRIL/MAY 2015) [R]
The six basic file operations are:
Creating a file
Writing a file
Reading a file
Deleting a file
Truncating a file
4) What are all the information‟s associated with an open file? [R]
Several pieces of information are associated with an open file which may be:
File pointer
Access rights
5) What are the different accessing methods of a file? (APRIL/MAY 2010) [R]
The different types of accessing a file are:
Sequential access: Information in the file is accessed sequentially
Direct access: Information in the file can be accessed without any particular order. Other access methods:
Creating index for the file, indexed sequential access method (ISAM),etc.
6) What is Directory? [R]
The device directory or simply known as directory records information-such as name, location, size, and
type for all files on that particular partition. The directory can be viewed as a symbol table that translates file names
into their directory entries.
7) What are the operations that can be performed on a directory? [R]
The operations that can be performed on a directory are
Create a file
Delete a file
Rename a file
List directory
Single-Level Directory
Two-level Directory
Tree-Structured Directories
Acyclic-Graph Directories
It separates file-system-generic operations from their implementation defining a clean VFS interface. It
allows transparent access to different types of file systems mounted locally.
VFS is based on a file representation structure, called a vnode. It contains a numerical value for a network-
wide unique file .The kernel maintains one vnode structure for each active file or directory.
14) Define seek time and latency time. [R]
The time taken by the head to move to the appropriate cylinder or track is called seek time. Once the head is
at right track, it must wait until the desired block rotates under the read-write head. This delay is latency time.
15) What are the allocation methods of a disk space? [R]
Methods of allocating disk space which are widely in use are
Contiguous allocation
Linked allocation
Indexed allocation
16) What are the advantages of Contiguous allocation? [R]
The advantages are
No external-fragmentation problems.
Linked scheme
Multilevel scheme
Combined scheme
21) What is garbage collection? (MAY /JUNE 2012 ) [R]
Garbage Collection (GC) is a form of automatic memory management. The garbage collector, or just
collector, attempts to reclaim garbage, or memory occupied by objects that are no longer in use by the program.
22) Mention the objectives of File Management System. (APR/MAY 2010) [R]
The system that an operating system or program uses to organize and keep track of files. For example, a
hierarchical file system is one that uses directories to organize files into a tree structure.
23) What is the content of a typical file control block? (APR/MAY 2011, APR/MAY 2010) [R]
File permissions
File size
File Control Block (FCB) is a file system structure in which the state of an open file is maintained.
24) What are the two types of system directories? (MAY/JUNE 2012) [R} Device directory,
describing physical properties of files.
File directory, giving logical properties of the files.
25) What is meant by polling?(MAY/JUNE 2014) [R]
Polling is the process where the computer waits for an external device to check for its readiness. The
computer does not do anything else than checking the status of the device .Polling is often used with low-level
hardware. Example: when a printer connected via a parallel port the computer waits until the next character has
been received by the printer. These processes can be as minute as only reading 1 Byte. Polling is the continuous (or
frequent) checking by a controlling device or process of other devices, processes, queues, etc.
26) State any three disadvantages of placing functionality in a device controller, rather than in the
kernel. (MAY/JUNE 2014) [R]
Three advantages:-
a. Bugs are less likely to cause an operating system crash.
b. Performance can be improved by utilizing dedicated hardware and hard-coded algorithms.
The kernel is simplified by moving algorithms out of it.
Three disadvantages:
a. Bugs are harder to fix - a new firmware version or new hardware is needed
b. Improving algorithms likewise require a hardware update rather than just kernel or device driver update
c. Embedded algorithms could conflict with application‘s use of the device, causing decreased performance.
27) How free-space is managed using bit vector implementation?[An]
The free-space list is implemented as a bit map or bit vector. Each block is represented by 1 bit. If the
block is free, the bit is 1; if the block is allocated, the bit is 0.
28) List the attributes of a file(MAY/JUNE 2014)[R]
Name, Identifier, Type, Location, Size, Protection, Time, Date and User
authentication.
29) What are the information contained in a boot control block and partition control block?
(MAY/JUNE 2014) [R]
Boot control block:
Contain information needed by the system to boot an operating from that partition. If the disk does not
contain an operating system, this block can be empty. It is typically the first block of a partition. In UFS, this is
called the boot block.
Partition Control block:
Contains partition details, such as number of blocks in the partition, size of the blocks, free block count and
free block pointers, and free FCB count and FCB pointers.
30) Define buffering. [R]
A buffer is a memory area that stores data while they are transferred between two devices or between
a device and an application. Buffering is done for three reasons
a. To cope with a speed mismatch between the producer and consumer of a data stream
b. To adapt between devices that have different data transfer sizes
c. To support copy semantics for application I/O
31) Define caching. [R]
A cache is a region of fast memory that holds copies of data. Access to the cached copy is more
efficient than access to the original. Caching and buffering are distinct functions, but sometimes a region of memory
can be used for both purposes.
32) Define spooling. [R]
A spool is a buffer that holds output for a device, such as printer, that cannot accept interleaved data
streams. When an application finishes printing, the spooling system queues the corresponding spool file for output
to the printer. The spooling system copies the queued spool files to the printer one at a time.
33) Define rotational latency and disk bandwidth. (NOV/DEC 2010, MAY/JUNE 2013) [R]
Rotational latency is the additional time waiting for the disk to rotate the desired
sector to the disk head.Disk bandwidth is the total number of bytes transferred, divided by the time between the
first request for service and the completion of the last transfer.
34) What are the various disk-scheduling algorithms? [R]
The various disk-scheduling algorithms are
SCAN Scheduling
C-SCAN Scheduling
35) What is the need for disk scheduling? (NOV/DEC 2012) [R]
In operating systems, seek time is very important. Since all device requests are linked in queues, the seek
time is increased causing the system to slow down.
Disk Scheduling Algorithms are used to reduce the total seek time of any request.
36) What is low-level formatting? [R]
Before a disk can store data, it must be divided into sectors that the disk controller can read and write.
This process is called low-level formatting or physical formatting. Low-level formatting fills the disk with a special
data structure for each sector. The data structure for a sector consists of a header, a data area, and a trailer.
37) What is the use of boot block? [R]
For a computer to start running when powered up or rebooted it needs to have an initial program to run.
This bootstrap program tends to be simple. It finds the operating system on the disk loads that kernel into
memory and jumps to an initial address to begin the operating system execution. The full bootstrap program is
stored in a partition called the boot blocks, at fixed location on the disk. A disk that has boot partition is called boot
disk or system disk.
38) What is sector sparing? [R]
Low-level formatting also sets aside spare sectors not visible to the operating system. The controller can be
told to replace each bad sector logically with one of the spare sectors. This scheme is known as sector sparing or
forwarding.
39) What is seek time? (MAY /JUNE 2012) [R]
Seek time: the time to position heads over a cylinder (~8 msec on average).
40) What are storage area networks? (April/May 2011) [R]
A storage area network (SAN) is a dedicated network that provides access to consolidated, block level data
storage. SANs are primarily used to make storage devices, such as disk arrays, tape libraries, and optical jukeboxes,
accessible to servers so that the devices appear like locally attached devices to the operating system.
41) Write a brief note on RAID. (MAY/JUNE 2013) [R]
RAID (redundant array of independent disks; originally redundant array of inexpensive disks) is a way of
storing the same data in different places (thus, redundantly) on multiple hard disks. By placing data on multiple
disks, I/O (input/output) operations can overlap in a balanced way, improving performance. Since multiple disks
increase the mean time between failures (MTBF), storing data redundantly also increases fault tolerance.
42) What Characteristics determine the disk access speed? (MAY /JUNE 2012) [R]
Seek time
Rotational latency
Settle time
43) Give the importance of Swap space Management. [R] (NOV/DEC 2012, APR/MAY2010,
NOV/DEC 2010)
Swap-space management: Swap-space management is low- level task of the operating system. The main
goal for the design and implementation of swap space is to provide the best throughput for the virtual memory
system.
Swap-space use: The operating system needs to release sufficient main memory to bring in a process that is
ready to execute. Operating system uses this swap space in various ways. Paging systems may simply store pages
that have been pushed out of main memory. UNIX operating system allows the use of multiple swap spaces. These
swap space are usually put on separate disks, so the load placed on the I/O system by paging and swapping can be
spread over the systems I/O devices.
Swap-space location: Swap space can reside in two places:
1. Separate disk partition
2. Normal file system
44) Write three basic functions which are provided by the hardware clocks and timers. (APRIL/MAY
2011) [R]
OSTickInit()
OSTimeSet()
OSTimeGet()
45) What are the advantages of Linked allocation? [R]
The advantages are
No external fragmentation.
The controller calculates the ECC and finds that the sector is bad. It reports this finding to the OS.
The next time that the system is rebooted ,a special command is run to tell the SCSI controller to
replace the bad sector with a spare.
After that, whenever the system requests logical block, the request is translated into the replacement
sector‘s address by the controller.
61) What is the advantage of bit vector approach in free space management ? [R] (APR/MAY 2018)
Advantages of bit vector approach:
Relatively simple
Efficient to find the first free blocks or n consecutive free blocks on the disk
62. Write short notes on file system mounting. (APR/MAY 2019)
The mount procedure is straightforward. The operating system is given the name of the device and the
mount point—the location within the file structure where the file system is to be attached. Some operating
systems require that a file system type be
provided, while others inspect the structures of the device and determine the type of file system. Typically, a mount
point is an empty directory.
63. What is SSD? (APR/MAY 2019)
The highest level, the operating system may maintain a cache of file-system data in main memory. In
addition, electronic RAM disks (also known as solid-state disks) may be used for high-speed storage that is
accessed through the file-system interface.
64. Enlist different types of file directory structure. (NOV/DEC 2021)
65. Is FAT file system advantageous? Justify. (NOV/DEC 2021)
PART-B&C
1) Explain the different disk scheduling algorithms with examples. [An] (APRIL/MAY 2010, MAY/JUNE 2012,
APRIL/MAY 2011, MAY/JUNE 2013) (MAY/JUNE 2014)
2) Explain and compare FCFS, SSTF, C-SCAN and C-LOOK disk scheduling algorithms with examples. [An]
(NOV/DEC 2012)
3) Write short notes on disk management. [U] (NOV/DEC 2009)
4) Write short notes on file system in Linux. [U] (NOV/DEC 2009) (NOV/DEC 2014)
5) Write an elaborate note on RAID and RAID Levels. [U] (APRIL/MAY 2010, MAY/JUNE 2012,
NOV/DEC 2012, MAY/JUNE 2013)
6) Explain the services provided by Kernel I/O subsystem. [An] (APRIL/MAY 2010, APRIL/MAY 2011,
NOV/DEC2012, MAY/JUNE 2013)
7) Consider the following I/O scenarios on a single-user PC.
A mouse used with a graphical user interface.
A graphics card with direct bus connection, accessible through memory-mapped I/O For each of these I/O
scenarios, would you design the operating system to use buffering, Spooling, caching, or a combination?
Would you use polled I/O, or interruption driven I/O? [An]
8) Write short notes on
1. File types
2. File attributes
3. File operations [U]
9) Explain the file allocation methods. [U] (APRIL/MAY 2010)
10) Explain the role of Access Matrix for protection in files. [An] (APRIL/MAY 2010)
11) Write in detail the security measures taken in file system?
1. Write short notes on file system mounting
2. Write in detail about the various file organizations [An]
12) Explain the allocation of frames in detail. [An]
13) Explain directory subsystem [U] (APRIL/MAY 2011)
(i) Explain Linked File Allocation method (6)
(ii) Explain the issues in designing a file system. (8)
(ii) Explain the various file directory structures. (8) (NOV/DEC 2012)
14) (i) Explain the different file access methods in detail. (8) (MAY/JUNE 2014)
(ii) Describe the two level and acyclic graph schemes for defining the logical structure of a
directory. [An] (MAY/JUNE 2013)
15) Explain the Linked list and indexed file allocation methods with neat diagram. Mention their
advantages and disadvantages. (8) [An] (MAY/JUNE 2013)
16) What are the most common schemes for defining the logical structure of a directory? [An]
(MAY/JUNE 2014)
17) Write a brief note on the steps involved in DMA transfer [U] (MAY/JUNE 2014)
18) Explain the data structures supported by kernel I/O system [U] (MAY/JUNE 2014)
19) Write a brief note on tertiary storage devices [U] (MAY/JUNE 2014)
20) Explain different directory implementation methods [U](NOV/DEC 2013)
21) Why disk scheduling is necessary? Explain the different seek optimization techniques [An]
(NOV/DEC 2013)
22) Explain about RAID structure in disk management with various RAID levels of organization in detail
[An] (Apr/May 2015)
23) Briefly discuss about the various directory structures. [An] (APR/MAY 2015)
24) Compare the functionalities of FCFS, SSTF, SCAN AND C-LOOK disk scheduling algorithms with an
example for each. [An] (APR/MAY 2015)
25) Write short notes on free space management. [U] (APR/MAY 2015, MAY/JUNE 2013)
26) (i) Discuss the functions of files and file implementation.
(ii) Explain free space management with neat example. [U] (Nov/Dec 2015)
27) On a disk with 200 cylinders, numbered 0 to 199, compute the number of tracks the disk arm must move to
satisfy the entire request in the disk queue. Assume the last request received was at truck 100. The queue in FIFO
order contains requests for the following tracks. 55, 58, 39, 18, 90, 160, 150, 38, 184. Perform the computation to
find the seek time for the following disk scheduling algorithms.
(i) FCFS (ii)SSTF
(iii) SCAN
(iv) C-SCAN
(v) LOOK [E] (Nov/Dec 2015)
28) (i) Why it is important to balance file-system I/O among the disks and controllers on a system in a
multitasking environment?
(ii) Discuss the advantages and disadvantages of supporting links to files that cross mount points. [An]
(MAY/JUNE 2016)
29) (i) Explain why logging metadata updates ensures recovery of a file system after a file-system crash.
(iii) Could a RAID level 1 organization achieve better performance for read requests than a RAID level
0 organizations? If so, how? [An] (MAY/JUNE 2016)
30) (i) Describe some advantages and disadvantages of using SSDs as a caching tier and as a disk-drive
replacement compared with using only magnetic disks. (8) [An] (NOV/DEC 2016)
(ii) Discuss how performance optimizations for file systems might result in difficulties in maintaining the
consistency of the systems in the event of computer crashes (8) [U] (NOV/DEC 2016)
31) (i) Distinguish between a STREAMS driver and a STREAMS module (8) [An] (NOV/DEC 2016)
(ii) Could a RAID level l organization achieve better performance for read requests than a RAID level 0
organization? If so, how? Explain. (8) [An](NOV/DEC 2016)
32) (i) Discuss about the various file access methods (7) [U] (APR/MAY 2017)
(ii)With neat sketch explain about the Directory structure, File Sharing (6) [U]
(APR/MAY 2017)
33) (i) Explain about kernel I/O subsystem and transforming I/O to hardware operations (7) [U] (APR/MAY
2017)
34) (ii) On a disk with 1000 cylinders, numbers 0 to 999, Compute the number of tracks the disk arm must move to
satisfy the entire request in the disk queue. Assume the last received was at track 345 and the head is moving
towards track 0.The queue in FIFO order contains requests for the following tracks. 123,874,692,475,105 and
376.Find the seek length for the following scheduling algorithm. (1) SSTF (2) LOOK (3) CSCAN [An] (APR/MAY
2017)
35) (i)In a variable partition scheme the operating system has to keep track of allocated and free space. Suggest a
means of achieving this. Describe the effects of new allocations and process terminations in your suggested
scheme.(5) [An] (NOV/DEC 2017)
(ii)What are different allocation methods in disk storage? Explain with neat sketch.(8)
36) Consider a disk queue with requests for I/O to blocks on cylinders 93,183, 37,122, 14,
124, 65, 67
If the disk head is start at 53, then find out the total head movement with respect to FCFS,SSTF, SCAN,C-
SCAN and LOOK scheduling.(13) [E] (NOV/DEC 2017)
37) What are the various disk space allocation methods? Explain any two in detail.[U] (APR/MAY 2018)
38) State and explain the FCFS, SSTF and SCAN disk scheduling with examples.
[U] (APR/MAY 2018)
33. Suppose that a disk drive has 5000 cylinders, numbered 0 through 4999. The drive is serving a request at
cylinder 143. The queue of pending requests, in FIFO order is 86, 1470, 913, 1774, 948, 1509, 1022, 1750, 130
Starting from the head position what is the total distance (in cylinders) that the disk arm moves to satisfy all the
pending requests for each of the following disk-scheduling algorithms? FCFS, SSTF, SCAN, LOOK, C- SCAN C-
LOOK. Explain the pros and cons of all disks scheduling algorithms. (13) (APR/MAY 2019)
34. (i) Explain in detail the various allocation methods with their pros and cons. (8)
(ii) Brief the various procedures need to be followed ‗in disk management. (5)
(APR/MAY 2019)
41.(i) What do you mean by directory structure? Also discuss Tree-Structure Directories and Acyclic-Graph
Directories. (7) (NOV/DEC 2021)
(ii) Describe in details about file system implementation and file allocation method (6).
42. Suppose that a disk drive has 200 cylinder, numbered 0 to 199. The work queue is: 23,89,132,42,187.
Determine the total distance for the following disk scheduling algorithms
(i) SCAN (ii) LOOK (iii) C-SCAN (iv) C-LOOK
Work Queue : 23,89,132,42,187