Beruflich Dokumente
Kultur Dokumente
Q1)
Q2)
Q3)
Q4)
Q5)
Q6)
Q7)
Q8)
Q9)
Q10)
Q11)
Q12)
Q13)
Q14)
Q15)
Q16)
Q17)
Q18)
Q19)
Q20)
Compare and contrast Byte Stream class and Character Stream class in Java.
Explain the steps involved in creating a File
Explain the Input stream and Output Stream class in details with Hierarchy.
What is a file? Why we need a file?
What is a Stream? What are the different types of streams available in java?
Explain in details that enable you to examine the file or directory that is identified by a
File object in detail.
Explain the fundamental of Thread.
Explain the life cycle of Thread.
Explain Synchronization and the methods to implement it and also explain the
importance of thread Synchronization in multithreading.
Explain the priorities by giving a suitable example.
Explain Deadlock and the methods for communicating between the threads.
Explain with example using wait() and notifyAll() in the Blank program.
Write a Java program to create Multiple Threads.
Define Generic Class and explain implementing and instantiating Generic type.
Explain Generic Types and Interfaces with Example.
Explain the relationship between Generic Type Instances.
Explain the use of Type parameter Bounds in Generic classes and show the way to
implement it using example.
Explain with the help of example to define a generic type with as many parameters as you
wish.
Discuss enum type with example.
Consider code fragment below.
class Outer{ private int x; class Inner{ private int x=10; private int y;
public void meth1(Outer out){ System.out.println("x "+ out.x);
System.out.println("x "+Outer.x); System.out.println("x +Outer.this.x); } }
public void meth2(Inner in){ in.y=5; System.out.println("y "+y); } }
In above code, list down the instructions which give compilation error.
Write, why these instructions give compilation error.
Unit-IV
1) Explain event delegation model with example.
http://www.google.co.in/imgres?imgurl=http%3A%2F%2Fwww.moock.org%2Flectures
%2Fff2003Workshop%2Fdelegationeventmodel-diagram.gif&imgrefurl=http%3A%2F
%2Fwww.moock.org%2Flectures%2Fff2003Workshop
%2Fslide17.html&h=380&w=640&tbnid=0SfuuE5gVMkkNM
%3A&zoom=1&docid=GyawzsocCkNqtM&ei=5kR3VLHYLo6yuASF0oLABQ&tbm=isch
&ved=0CBwQMygAMAA&iact=rc&uact=3&dur=402&page=1&start=0&ndsp=15
http://careerride.com/java-delegation-event-model.aspx
2) What is the difference between application and an Applet?
Operating System
http://web.cs.ucdavis.edu/~pandey/Teaching/ECS150/Lects/06memory.pdf
http://www.slideshare.net/wx672/operating-systcpu-sched
Unit-3
Question
M
a
r
k
s
2
4
6
4
http://www.tutorialspoint.com/operating_system/os_process_scheduling_algorithms.htm
http://ijcsi.org/papers/IJCSI-8-6-2-201-206.pdf
Explain gang scheduling policy.
http://en.wikipedia.org/wiki/Gang_scheduling
http://books.google.co.in/books?id=MBIQS9nayYYC&pg=SA4PA19&dq=Explain+gang+scheduling+policy+in+operating+system&hl=en&sa=X&ei=BwB8
VK2eINK0uASoqoCoBg&ved=0CDwQ6AEwBg#v=onepage&q=Explain%20gang
%20scheduling%20policy%20in%20operating%20system&f=false
http://www.expertsmind.com/questions/gang-scheduling-3019460.aspx
Write short note on deadline scheduling
http://books.google.co.in/books?
id=LhQ7BAAAQBAJ&pg=PA418&dq=deadline+scheduling+in+operating+system&hl=en&
sa=X&ei=KgN8VOqbMcG2uASD54CwCQ&ved=0CDcQ6AEwBQ#v=onepage&q=deadlin
e%20scheduling%20in%20operating%20system&f=false
http://books.google.co.in/books?
id=kbBn4X9x2mcC&pg=PA172&dq=deadline+scheduling+in+operating+system&hl=en&sa
=X&ei=KgN8VOqbMcG2uASD54CwCQ&ved=0CCsQ6AEwAw#v=onepage&q=deadline
%20scheduling%20in%20operating%20system&f=false
List and briefly define any three techniques for thread scheduling.
http://www.slideshare.net/nitish31/thread-scheduling
Load sharing---processes are not assigned to a particular processor. A global queue of ready threads is
maintained,
and each processor, when idle, selects a thread from the queue.
4
2
http://www.mu.ac.in/myweb_test/MCA%20study%20material/OS%20-%20PDF.pdf
Unit-4
Question
Circular Buffer
http://books.google.co.in/books?
id=MBIQS9nayYYC&pg=PA8&lpg=PA8&dq=circular+buffer+in+operating+system&source
=bl&ots=b7tkXTUjUN&sig=rmP7SVyEmazsBprXRoVRyZqtFq4&hl=en&sa=X&ei=ejBFV
P2mFY23uATK3oKwDg&ved=0CEkQ6AEwCDgK#v=onepage&q=circular%20buffer
%20in%20operating%20system&f=false
http://www.slideshare.net/nadhrahnini/io-buffering
C-SCAN
http://www.cs.iit.edu/~cs561/cs450/disksched/disksched.html
http://www.slideshare.net/myrajendra/c-scan-scheduling-50-2
I/O buffering
http://wcipeg.com/wiki/I/O_buffering
https://www.cl.cam.ac.uk/teaching/0809/OpSysI/os1a-handout4.pdf
http://www.csd.uwo.ca/courses/CS3305a/Chapter11-new.pdf
Write short note on RAID
http://www.ladenterprizes.com/raid.htm
Explain the shortest service time first scheduling policy.
http://en.wikipedia.org/wiki/Shortest_remaining_time
Explain the term Seek Time rotational Delay and Average Access Time of disk drives. Also
list various disk scheduling policies adopted by the disk controller
http://courses.cs.washington.edu/courses/cse378/10sp/lectures/lec26.pdf
http://www.slideshare.net/J.T.A.JONES/disk-scheduling
Discuss the disk performance parameters?
http://lass.cs.umass.edu/~shenoy/courses/fall10/lectures/Lec20.pdf
http://www2.cs.uidaho.edu/~krings/CS240/Notes.F13/240-13-31.pdf
http://books.google.co.in/books?id=RhJfOL92DgEC&pg=SA7-PA3&lpg=SA7-
M
a
r
k
s
4
4
4
4
PA3&dq=disk+performance+parameters+in+operating+system&source=bl&ots=4zAts6iQCL
&sig=ggjtJamMxXYDQ_VVlWJpyBH6sS8&hl=en&sa=X&ei=Z5NlVKijOpCVuAS_h4DY
CQ&ved=0CDMQ6AEwBA#v=onepage&q=disk%20performance%20parameters%20in
%20operating%20system&f=false
Define disk cache.
http://searchstorage.techtarget.com/definition/disk-cache
What is file management system? List the different file allocation methods Explain any one in
details
http://en.wikipedia.org/wiki/File_system
http://www.techopedia.com/definition/1832/file-management-system
http://medusa.sdsu.edu/cs570/Lectures/Chapter8.pdf
http://www.slideshare.net/myrajendra/allocation-methods-continuous-method47
What is file system? Explain file system software architecture. Also comment on UNIX file
system.
Index file allocation
http://www.slideshare.net/myrajendra/linked-allocation-48?next_slideshow=1
http://medusa.sdsu.edu/cs570/Lectures/Chapter8.pdf
http://itnsec.blogspot.in/2010/09/operating-system.html
Index file organization
http://www.techopedia.com/definition/1832/file-management-system
Disc allocation Table.
What do you mean by File Allocation with respect to Secondary storage management?
Describe Chained and Indexed Allocation for File.
Discuss contiguous chained and indexed file allocation methods. What do you mean by disk
inter leaving?
http://www.slideshare.net/myrajendra/index-allocation-48-1
http://www.webopedia.com/TERM/I/interleaving.html
Illustrate the different record blocking techniques
http://books.google.co.in/books?id=MBIQS9nayYYC&pg=SA10-PA13&lpg=SA10PA13&dq=different+record+blocking+techniques+in+operating+system&source=bl&ots=b7t
nRVXiUH&sig=Zle0H_Vb3j624kRoiwH22AK19Uw&hl=en&sa=X&ei=6ChqVLSRCtiVuA
TQuYDwCA&ved=0CC4Q6AEwAw#v=onepage&q=different%20record%20blocking
%20techniques%20in%20operating%20system&f=false
Write a short note on File management in UNIX
Explain different method of file allocation
What are the access rights for the files? Discuss them with respect to Unix file system.
What file organization would you choose to maximize efficiency in terms of speed of access,
use of storage space and ease of updating when the data are updated infrequently and
accessed frequently in random order.
What are the security concerns of operating system?
pdf
Describe the nature of threats faced by different computer system assets.
Define Trojan horse attack.
http://en.wikipedia.org/wiki/Trojan_horse_(computing)
Write difference for viruses and Trojan horses
4
2
2
2
6
4
4
4
2
2
4
2
2
http://www.slideshare.net/tonikryeziu/viruses-worms-trojans-and-anti-viruses-27503972?
related=1
Illustrate the taxonomy of malicious programs that may affect the functioning of computer
system or network. Differentiate between Virus and Worm. Describe types of viruses and their
detection/cure approaches.
Write short notes on Trojan horse defense
http://books.google.co.in/books?id=aLUZAwAAQBAJ&pg=RA18-PA14&lpg=RA18PA14&dq=trojan+horse+defense+in+operating+system&source=bl&ots=_b_IpVFpfm&sig=
TLr0wwQKdsRLxgpOPN1MT3P1fcs&hl=en&sa=X&ei=nC5qVIbfKMKGuAS1qILICQ&ve
d=0CD4Q6AEwBg#v=onepage&q=trojan%20horse%20defense%20in%20operating
%20system&f=false
Write difference for viruses and Trojan horses
Illustrate the taxonomy of malicious programs that may affect the functioning of computer
system or network. Differentiate between Virus and Worm. Describe types of viruses and their
detection/cure approaches.
Write short note on Use of Access Matrix for Protection.
pdf
Write short notes on intrusion detection
http://en.wikipedia.org/wiki/Intrusion_detection_system
Define client server computing and explain the classes of client server applications
http://searchnetworking.techtarget.com/definition/client-server
pdf
Discuss the three tier client server architecture with illustration.
pdf
Define the term LPC
pdf
What is cluster middle ware? Discuss the functionalities provided by the middleware.
http://en.wikipedia.org/wiki/Middleware
http://docs.oracle.com/cd/E15523_01/core.1111/e10103/intro.htm#BABBFJBI
List the benefits that can be achieved with clustering
Write short notes on cluster configuration
http://en.wikipedia.org/wiki/Computer_cluster
List the functions of cluster middleware.
What is cluster middleware? Discuss the functionalities provided by the middleware.
Which are different methods adopted for process migration? Describe the Event Ordering
algorithm.
Discuss the possible reasons for process migration.
http://books.google.co.in/books?
id=s0MUQn7cxA4C&pg=PA544&lpg=PA544&dq=methods+of+process+migration+
+in+operating+system&source=bl&ots=hfOPn0dJdG&sig=zSjtCIrNPFGf221lYG8e6yOTFo&hl=en&sa=X&ei=f_t_VM_FHsOIuwSp84KYAQ&ved=0CDYQ6AEwBDg
K#v=onepage&q=methods%20of%20process%20migration%20%20in%20operating
%20system&f=false
What is the importance of taking destinations view in process migration?
2
4
2
4
4
2
2
4
2
2
2
4
4