Beruflich Dokumente
Kultur Dokumente
21) Explain the various directory structures used in Operating System for storing
files. Give Merits and Demerits of all the directory structures.\
22) Examine the following table of resource requirement for the 4 processes and
determine whether the current allocation is safe state, with regard to avoid deadlock.
Total resources=10
Available resources=3
23) Write short notes on:-
a) Real Time Operating System
b) UNIX Kernel
c) DEC net.
24) Describe the various technique for Password Protection and Cryptography.
25) Discuss Inode Structure and its use in UNIX.
26) When a process attempts to delete a file, the operating system must ensure that
the process has delete access to that file. Using the UNIX directory and inode
structure, explain how unix can determine if the file:
/student/os/file
can be deleted by a process with user id 0f 20 and a group id of 40.
27) Using the UNIX file system assume that the inode of the current directory is
known. Explain how to find the inode of the filel( if the file exists)
28) Explain in detail Program Threats and the System Threats.
29) A password may become known to other users in a variety of ways. Is there a
simple method for detecting that such an event has occurred. Explain your
answer.
30) Discuss the relative merits of sector sparing and sector slipping?
31) Explain Indexed Aloocation? Also explain the issues it deals with.
32) Explain all the Page Replacement Algorithms?
33) Difference between Primary storage and secondary storage?
34) Explain the access matrix with 3 additional operations Copy, Owner, Control?
35) Why is it difficult to protect a system in which users are allowed to do their own
I/O?
36) What is the need-to-know principle? Why is it important for a protection system
to adhere to this principle?
37) Explain the method for selecting a Disk Scheduling Algorithm?
38) Explain in detail all the Disk Scheduling Algorithms?
39) Explain all the different Allocation Methods?
40) Explain Page Replacement? Also, explain the Page Replacement Algorithms?
41) What is Segmentation? Explain the Implementation of Segment Tables?
42) Describe the actions taken by thread library to context switch between user level
threads?
43) On a system with paging, a process cannot access memory that it does not own;
why? How could the operating system allow access to other memory? Why
should it or should it not?
44) Give a non-computer example of preemptive and non-preemptive scheduling.
45) What are the different tasks of Lexical analysis?
46) Differentiate between Complier and Interpreter?
47) Explain briefly about, processor, assembler, compiler, loader, linker and the
functions executed by them.
48) What are the different functions of Syntax phase, Sheduler?
49) What are the main difference between Micro-Controller and Micro- Processor?
50) Which is the best page replacement algorithm and Why? How much time is
spent usually in each phases and why?
Submitted By: Aditi Kapur