Sie sind auf Seite 1von 4

Code No: R5310504 1

III B.Tech I Semester(R05) Supplementary Examinations, May 2009


OPERATING SYSTEMS
(Common to Computer Science & Engineering, Electronics & Instrumentation
Engineering, Information Technology, Electronics & Control Engineering, Computer
Science & Systems Engineering and Electronics & Computer Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
?????

1. Justify the following statements.

(a) OS can be viewed as a Resource Allocator.


(b) OS is a Control Program [8+8]

2. Draw and explain about five-state process model. [16]

3. (a) What is a semaphore? What are the various operations defined on it?
(b) What is the difference between weak semaphore and strong semaphore? Explain. [8+8]

4. Explain about protection technique of critical section in LINUX. [16]

5. (a) What is virtual memory? Explain.


(b) Discuss the function of lazy swapper.
(c) Explain the hardware to support demand paging. [5+4+7]

6. Suppose the head of a moving- head disk with 300 tracks, numbered 0 to 299, is currently
serving a request at track 300 and has just finished a request at track 125. If the queue of
requests is kept in FIFO order: 86, 247, 91, 177, 94, 250, 102, 275, 230.What is the total head
movement to satisfy these requests for the following disk scheduling algorithms.

(a) FCFS
(b) Random
(c) PRI
(d) SCAN
(e) SSTF
(f) C- SCAN [16]

7. (a) What is the average search time to find a record in a file less for an indexed sequential file
than for a sequential file? Explain.
(b) What is the difference between a file and a database?
(c) What are typical operations that may be performed on a directory? [6+4+6]

8. (a) Give a detail note on E-mail viruses.


(b) What is a malicious program? Explain.
(c) Explain simple security property and *-property? [6+6+4]

?????
Code No: R5310504 2
III B.Tech I Semester(R05) Supplementary Examinations, May 2009
OPERATING SYSTEMS
(Common to Computer Science & Engineering, Electronics & Instrumentation
Engineering, Information Technology, Electronics & Control Engineering, Computer
Science & Systems Engineering and Electronics & Computer Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
?????

1. What are the various services offered by the Operating Systems? [16]

2. Explain about the following.

(a) Process identification.

(b) Processor state information. [8+8]

3. How can Semaphores be used to achieve mutual exclusion? Explain with an example. [16]

4. What are the different LINUX spinlcocks? Explain. [16]

5. (a) Describe hierarchical paging techniques for structuring the page table.

(b) Discuss about hashed page table and clustered page table. [8+8]

6. Make a comparison of the following disk scheduling algorithms.

(a) Shortest service time first

(b) SCAN

(c) Last in First Out

(d) FSCAN. [16]

7. Explain the reliability and protection mechanisms followed in UNIX file system.
[16]

8. (a) Give the classification of intruders. Explain each class.

(b) Comparison User-Oriented access control with data-oriented access control.


[8+8]

?????
Code No: R5310504 3
III B.Tech I Semester(R05) Supplementary Examinations, May 2009
OPERATING SYSTEMS
(Common to Computer Science & Engineering, Electronics & Instrumentation
Engineering, Information Technology, Electronics & Control Engineering, Computer
Science & Systems Engineering and Electronics & Computer Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
?????

1. Draw and explain how the interrupt occurs after instruction at location N for the changes in
memory and registers. [16]

2. Explain the following transitions:

(a) Blocked → Blocked/Suspended.

(b) Blocked/Suspended → Ready/Suspended.

(c) Ready/Suspended → Ready. [5+5+6]

3. What is critical section problem? Explain with example. [16]

4. What is Resource-Allocation graph? Explain about various situations by drawing resource


allocation Graph . [16]

5. Explain contiguous memory allocation scheme for memory management. What are its advan-
tages and disadvantages? [16]

6. What is the purpose of processor scheduling? Explain various types of scheduling for uniproces-
sor system. [16]

7. (a) Discuss indexed allocation methods for secondary storage management.

(b) What are the advantages and disadvantages of pile file organization over hashed file orga-
nization? [8+8]

8. What is a trusted system? Explain how Trojan horse defense is by the secure, trusted operating
system. [16]

?????
Code No: R5310504 4
III B.Tech I Semester(R05) Supplementary Examinations, May 2009
OPERATING SYSTEMS
(Common to Computer Science & Engineering, Electronics & Instrumentation
Engineering, Information Technology, Electronics & Control Engineering, Computer
Science & Systems Engineering and Electronics & Computer Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
?????

1. Write about evaluation of Operating Systems? [16]

2. Write short notes on the following:

(a) Multithreading

(b) Thread functionality

(c) Thread Synchronization. [5+5+6]

3. (a) What is a semaphore? What are the various operations defined on it?

(b) What is the difference between weak semaphore and strong semaphore? Explain. [8+8]

4. Explain the solution to Dining Philosophers Problem using Monitors. [16]

5. (a) Describe hierarchical paging techniques for structuring the page table.

(b) Discuss about hashed page table and clustered page table. [8+8]

6. What is the purpose of processor scheduling? Explain various types of scheduling for uniproces-
sor system. [16]

7. (a) Explain the disk storage concepts used in NTFS.

(b) Give the information in a UNIX Disk- resident Inode. [8+8]

8. What is the trusted system? Explain the reference monitor concept and multilevel secure
system in detail. [16]

?????

Das könnte Ihnen auch gefallen