0% found this document useful (0 votes)
186 views4 pages

MSBTE Operating System Question Paper

osy question paper
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
186 views4 pages

MSBTE Operating System Question Paper

osy question paper
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

17512

21718
3 Hours / 100 Marks Seat No.

Instructions – (1) All Questions are Compulsory.


(2) Answer each next main Question on a new page.
(3) Illustrate your answers with neat sketches wherever
necessary.
(4) Figures to the right indicate full marks.
(5) Assume suitable data, if necessary.
(6) Use of Non-programmable Electronic Pocket
Calculator is permissible.
(7) Mobile Phone, Pager and any other Electronic
Communication devices are not permissible in
Examination Hall.

Marks

1. a) Attempt any THREE of the following: 12


(i) List and draw a neat labelled diagram of four
components of a computer system.
(ii) List three main levels of data storage and explain cache
storage.
(iii) List and draw a neat labelled diagram of process state.
(iv) List merits of I/O scheduling (Four points) and Demerits
of I/O scheduling.

P.T.O.
17512 [2]
Marks
b) Attempt any ONE of the following: 6
(i) Explain the working of Inter-process communication
considering.
1) Shared memory
2) Message passing
(ii) List four Deadlock prevention condition and explain the
following terms.
1) Removal of “No preemption” condition.
2) Elimination of “Circular wait” related to deadlock
prevention condition.

2. Attempt any FOUR of the following: 16


a) Define clustered systems? List four characteristics of clustered
systems.
b) Explain following two services of operating systems.
(i) File system manipulation
(ii) Resource Allocation
c) Define synchronization
Explain
(i) Blocking
(ii) Non Blocking in message passing
d) List four process scheduling criteria and explain the term
Turnaround in detail.
e) Explain Deadlock Avoidance with example.
f) Explain “Bitmap” method in free space management technique.
17512 [3]
Marks
3. Attempt any FOUR of the following: 16
a) Explain Time sharing OS in detail.
b) List types of system call and explain the system call –
“Information Maintenance”.
c) Differentiate between long term scheduling and medium term
scheduling.
d) The Jobs are scheduled for execution as follows – solve the
problem by using preemptive SJF (Shortest Job First).
Find average waiting time using Gantt chart.
Process Arrival Time Burst Time
P1 0 10
P2 1 04
P3 2 14
P4 3 08
e) Explain the working of Two-level directory structure with neat
labelled diagram.

4. a) Attempt any THREE of the following: 12


(i) List Advantages and Disadvantages of Batch Monitoring
functions. (Four points)
(ii) Explain major activities of memory management component
of an operating system.
(iii) Define the following with respect to resources.
1) A preemptable resource
2) A non-preemptable resource
(iv) List four types of UNIX files and draw Unix file system.
b) Attempt any ONE of the following: 6
(i) Explain working of CPU switch from process to process
with diagram.
(ii) Explain CPU and I/O burst cycle with the help of diagram.

P.T.O.
17512 [4]
Marks
5. Attempt any TWO of the following: 16
a) Describe concept of file, its types and operations on file
attributes in detail.
b) Explain swapping in operating system with diagram and example.
c) Comparison between Linux and UNIX. (Four points)
(i) User interface
(ii) Name of provider
(iii) Processing speed
(iv) Security

6. Attempt any FOUR of the following: 16


a) List characteristics of operating system for smooth functioning
of a computer – system. (Eight points)
b) With neat labelled diagram explain the working of Booting
process.
c) With neat labelled diagram explain Unix layered structure.
d) Explain the working of semaphores.
e) Give difference between
External fragmentation and
Internal fragmentation (four points)

Common questions

Powered by AI

Linux typically offers a graphical user interface that is diverse and customizable, supported by multiple desktop environments, whereas UNIX traditionally uses a command-line interface. For providers, Linux is community-driven with numerous distributions maintained by various organizations and individuals, while UNIX systems are usually proprietary and controlled by established vendors like IBM. In terms of processing speed, Linux is often appreciated for efficiency on modern hardware due to its lightweight kernel and modular structure. Security-wise, Linux benefits from ongoing community scrutiny and frequent updates, while UNIX is known for its robustness and built-in security features from its design for multi-user environments .

Long-term scheduling, also known as admission scheduling, controls the degree of multiprogramming by determining which jobs or processes are admitted to the ready queue. In contrast, medium-term scheduling is part of the swapping function where it temporarily removes processes from main memory and places them in secondary storage, thus allowing for memory management flexibility and the adjustment of active processes. The main difference revolves around their purpose; long-term scheduling manages load, while medium-term scheduling adjusts course after load balancing for optimal resource use .

External fragmentation occurs when free memory has enough total space to satisfy a process's needs but is not contiguous, causing inefficient use of RAM. Internal fragmentation, on the other hand, arises when allocated memory includes unexpected wasted space due to block sizing exceeding the process's needs. The primary difference lies in their nature: external fragmentation is about scattered free space outside of allocated regions, whereas internal fragmentation involves unused space within allocated regions .

Deadlock avoidance can be achieved by ensuring a system will never enter an unsafe state. This involves using strategies like the Banker's algorithm, where the system checks resource-allocation states and grants resources only if it leads to a safe state. For example, if there are three resource types and the current processes require resources within the system's safe state, requests are only granted if there remains a combination of allocations that allows every process to complete without running into insufficient resource conditions .

File management involves handling the creation, deletion, reading, writing, and organizing of files within a computer system. It encompasses activities such as defining data structures for storing file attributes, managing directory structures to organize files hierarchically, and implementing access methods for processes. Operations include opening a file to access data stored within, converting high-level requests into hardware read/write operations, and maintaining consistency through locks in multi-user environments. Advanced systems might use journaling to track changes, ensuring recovery in case of system failure .

Time-sharing operating systems function by distributing computational resources among multiple users simultaneously. They achieve this through scheduling algorithms that allocate a time slice or quantum to each user, allowing multiple users and processes to share CPU time efficiently. This creates an interactive environment where users perceive their processes as running while in reality, the CPU switches rapidly between tasks, maintaining process states and storing them to allow for task switching without data loss .

Merits of I/O scheduling include improved throughput by efficiently managing multiple I/O requests, minimized waiting time by prioritizing processes based on need, and enhanced system performance due to reduced disk arm movement. Demerits include potential starvation for low-priority processes as they could experience delayed execution, complexity in implementation, and the possibility of not accurately predicting real-time I/O demands .

Clustered systems are designed to improve performance, provide redundancy for fault tolerance, and enhance scalability by linking multiple computers to work as a single system. Characteristics include tightly-coupled physical resources, rapid communication due to shared memory or high-speed interconnects, increased reliability and availability through redundancy, and unified resource management to maintain consistency across nodes .

Semaphores are synchronization tools used to control access to shared resources by multiple processes in a concurrent system. They work by using a counter that represents the number of available resources; a semaphore decrements when a process accesses the resource and increments when the resource is freed. The counter prevents processes from entering the critical section when the count is zero. Semaphores can be binary (mutexes) or counting semaphores, providing flexibility in managing resources. Their implementation can be complex due to potential problems like deadlock and priority inversion .

The advantages of batch processing include efficient handling of high-volume transaction processing, optimized processing time as jobs are executed in a sequence without requiring user interaction, and cost-effectiveness by maximizing resource usage during off-peak hours. However, disadvantages include lack of real-time processing capability, dependence on perfect job streams to prevent errors, and potential latency as jobs wait for their batch, leading to possible data processing delays .

You might also like