Beruflich Dokumente
Kultur Dokumente
Unit -1
1. Describe an encryption method provided in Unix to secure files. How does one
2. retrieve an encrypted file using an encryption command? Explain the basic
3. principle.
4. Describe briefly
a. The methods of file accessing.
b. Two level directory structure.
5. What is the role of an inode?
6. Describe the structure of Inode in UNIX. What entries undergo changes when a
7. file is opened to read / write / copied / renamed.
8. What is an I-node and what role does it play.
9. What corresponds to i-node in the MS environment?
10. What is a root file system?
11. List the various disk space allocation strategies. Explain clearly the contiguous
12. allocation technique.
13. Compare and contrast chained allocation with indexed allocation technique of file
14. allocation
15. Define external and internal fragmentation
16. What are the different types of files? What are the tasks of the file management
17. system? List some (at least two) file system related commands in UNIX? How
18. does OS ensure security in file system?
Unit-3
Unit-4
1. What is memory?
2. What is memory management?
3. What are the different ways of address binding?
4. Explain dynamic binding and linking.
5. What is swapping? Explain the concept of swapping with example.
6. What is fragmentation and its types?
7. Explain the concept of paging with hardware support?
8. What are shared pages?
9. Why the page size is typically in power of 2?
10. Explain the structure of page tables.
11. What is segmentation?
12. How paging and segmentation are associated?
13. What is virtual memory?
14. Explain the concept of demand paging.
15. Explain “performance of demand paging”.
16. Explain the following:
i. Optimal page replacement algorithm
ii. LRU page replacement algorithm
iii. FIFO page replacement algorithm
17. What is thrashing? Explain the concept of thrashing.
Unit-5
1. What is deadlock?
2. What are the necessary conditions for deadlock?
3. What is resource allocation graph (RAG)?
4. What are the various approaches for deadlock handling?
5. How deadlock is prevented?
6. What is safety algorithm?
7. What is deadlock detection?
8. Write the detection algorithm to find deadlocks when there are multiple instances of resource type.
9. How deadlock is recovered?
10. What are the conditions to be satisfied for critical section problem?
11. What is the difference between semaphores and monitors?
12. How semaphores are implemented?
13. What are threads?
14. What is multithreading and its models?
15. Explain banker’s algorithm in detail.