Beruflich Dokumente
Kultur Dokumente
3. (a) What is a semaphore? What are the various operations defined on it?
(b) What is the difference between weak semaphore and strong semaphore? Explain. [8+8]
6. Suppose the head of a moving- head disk with 300 tracks, numbered 0 to 299, is currently
serving a request at track 300 and has just finished a request at track 125. If the queue of
requests is kept in FIFO order: 86, 247, 91, 177, 94, 250, 102, 275, 230.What is the total head
movement to satisfy these requests for the following disk scheduling algorithms.
(a) FCFS
(b) Random
(c) PRI
(d) SCAN
(e) SSTF
(f) C- SCAN [16]
7. (a) What is the average search time to find a record in a file less for an indexed sequential file
than for a sequential file? Explain.
(b) What is the difference between a file and a database?
(c) What are typical operations that may be performed on a directory? [6+4+6]
?????
Code No: R5310504 2
III B.Tech I Semester(R05) Supplementary Examinations, May 2009
OPERATING SYSTEMS
(Common to Computer Science & Engineering, Electronics & Instrumentation
Engineering, Information Technology, Electronics & Control Engineering, Computer
Science & Systems Engineering and Electronics & Computer Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
?????
1. What are the various services offered by the Operating Systems? [16]
3. How can Semaphores be used to achieve mutual exclusion? Explain with an example. [16]
5. (a) Describe hierarchical paging techniques for structuring the page table.
(b) Discuss about hashed page table and clustered page table. [8+8]
(b) SCAN
7. Explain the reliability and protection mechanisms followed in UNIX file system.
[16]
?????
Code No: R5310504 3
III B.Tech I Semester(R05) Supplementary Examinations, May 2009
OPERATING SYSTEMS
(Common to Computer Science & Engineering, Electronics & Instrumentation
Engineering, Information Technology, Electronics & Control Engineering, Computer
Science & Systems Engineering and Electronics & Computer Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
?????
1. Draw and explain how the interrupt occurs after instruction at location N for the changes in
memory and registers. [16]
5. Explain contiguous memory allocation scheme for memory management. What are its advan-
tages and disadvantages? [16]
6. What is the purpose of processor scheduling? Explain various types of scheduling for uniproces-
sor system. [16]
(b) What are the advantages and disadvantages of pile file organization over hashed file orga-
nization? [8+8]
8. What is a trusted system? Explain how Trojan horse defense is by the secure, trusted operating
system. [16]
?????
Code No: R5310504 4
III B.Tech I Semester(R05) Supplementary Examinations, May 2009
OPERATING SYSTEMS
(Common to Computer Science & Engineering, Electronics & Instrumentation
Engineering, Information Technology, Electronics & Control Engineering, Computer
Science & Systems Engineering and Electronics & Computer Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
?????
(a) Multithreading
3. (a) What is a semaphore? What are the various operations defined on it?
(b) What is the difference between weak semaphore and strong semaphore? Explain. [8+8]
5. (a) Describe hierarchical paging techniques for structuring the page table.
(b) Discuss about hashed page table and clustered page table. [8+8]
6. What is the purpose of processor scheduling? Explain various types of scheduling for uniproces-
sor system. [16]
8. What is the trusted system? Explain the reference monitor concept and multilevel secure
system in detail. [16]
?????