CS3451-OS Question Bank
CS3451-OS Question Bank
AL3452-OPERATING SYSTEM
UNIT I INTRODUCTION 7
Computer System - Elements and organization; Operating System Overview - Objectives
and Functions - Evolution of Operating System; Operating System Structures –
Operating System Services - User Operating System Interface - System Calls – System
Programs - Design and Implementation - Structuring methods.
UNIT II PROCESS MANAGEMENT 11
Processes - Process Concept - Process Scheduling - Operations on Processes - Inter-
process Communication; CPU Scheduling - Scheduling criteria - Scheduling algorithms:
Threads - Multithread Models – Threading issues; Process Synchronization - The
Critical-Section problem - Synchronization hardware – Semaphores – Mutex - Classical
problems of synchronization - Monitors; Deadlock - Methods for handling deadlocks,
Deadlock prevention, Deadlock avoidance, Deadlock detection, Recovery from
deadlock.
UNIT III MEMORY MANAGEMENT 10
Main Memory - Swapping - Contiguous Memory Allocation – Paging - Structure of the
Page Table - Segmentation, Segmentation with paging; Virtual Memory - Demand
Paging – Copy on Write - Page Replacement - Allocation of Frames –Thrashing.
UNIT IV STORAGE MANAGEMENT 10
Mass Storage system – Disk Structure - Disk Scheduling and Management; File-System
Interface - File concept - Access methods - Directory Structure - Directory organization -
File system mounting - File Sharing and Protection; File System Implementation - File
System Structure - Directory implementation - Allocation Methods - Free Space
Management; I/O Systems – I/O Hardware, Application I/O interface, Kernel I/O
subsystem.
UNIT V VIRTUAL MACHINES AND MOBILE OS 7
Virtual Machines – History, Benefits and Features, Building Blocks, Types of Virtual
Machines and their Implementations, Virtualization and Operating-System Components;
Mobile OS - iOS and Android.
TOTAL: 45 PERIODS
UNIT I INTRODUCTION 7
Computer System - Elements and organization; Operating System Overview -
Objectives and Functions - Evolution of Operating System; Operating System
Structures – Operating System Services - User Operating System Interface - System
Calls – System Programs - Design and Implementation - Structuring methods.
PART – A
1. List and briefly define the four main elements of a computer? [R]
Processor – Controls the operation of the computer & performs its data
processing functions
Main memory – Stores data & programs.it is volatile.
I/O modules – Move data between the computer & its external environment
such as disks, communication equipment & terminals.
System Bus – Provides for communication among processors, main memory &
I/O modules.
2. Define the two main categories of processor register? [R]
Two categories are
User- visible registers: - It Enable the machine or assembly language
programmer to minimize main memory references by optimizing register use.
Control & Status registers: - Registers used by the processor to control the
operation of the processor.
3. In general terms, what are the four distinct actions that machine instruction can
specify? [An]
Processor – Memory
Processor –I/O
Data Processing
Control
4. What is an Interrupt? [R]
Interrupt are provided primarily as way to improve processor utilization.
It is a mechanism by which other modules( I/O, Memory) may interrupt the
normal sequencing of the processor.
Classes of interrupts:-
Program
Timer
I/O
Hardware failure
5. How are multiple interrupt dealt with? [An]
Two approaches can be taken to dealing with interrupts
Disabled Interrupt – Processor ignores any new interrupt request signal.
Define Priority for interrupt – It allows an interrupt of higher priority.
6. What characteristics distinguish the various elements of a memory hierarchy?
[R]
Characteristics are
1. Cost Per bit
2. Capacity
3. Access Time
4. Frequency of access to the memory by the processo
7. What is Cache Memory? [R]
1. Cache memory is invisible to the OS
2. It interacts with other memory management hardware
3. Cache contains a copy of a portion of main memory .
8. List and briefly define 3 Techniques of I/O operation? [R]
Programmed I/O
Interrupt Driven I/O
Direct memory access
9. What is the distinction b/w spatial locality & temporal locality? [An]
Temporal locality refers to the reuse of specific data and/or resources within
relatively small time durations.
Spatial locality refers to the use of data elements within relatively close storage
locations.
Sequential locality, a special case of spatial locality, occurs when data elements
are arranged and accessed linearly, e.g., traversing the elements in a one-
dimensional array.
10. Define Locality of Reference [R]
Locality of reference, also known as the principle of locality, is the phenomenon
of the same value or related storage locations being frequently accessed.
There are two basic types of reference locality.
o Temporal locality refers to the reuse of specific data and/or resources within
relatively small time durations.
o Spatial locality refers to the use of data elements within relatively close storage
locations.
o Sequential locality, a special case of spatial locality, occurs when data elements
are arranged and accessed linearly, e.g., traversing the elements in a one-
dimensional array.
11. What is an operating system? (NOV/DEC 2013) [R]
An operating system is a program that manages the computer hardware. it
act as an intermediate between a user‘s of a computer and the computer hardware. It
controls and coordinates the use of t h e hardware among the various application
programs for the various users.
12. What are the 3 objective of an OS Design? [R]
Convenience – An OS makes a computer more convenient to use
Efficiency -- An OS allows the system resources to be used in efficient
manner
Ability to Evolve – An OS Constructed in such a way as to permit the effective
development, testing & introducing new function.
13. List the Services of operating system function. (NOV/DEC 2013) [R]
1. Program development
2. Program execution
3. User Interface
4. I/O Operations
5. File system Manipulation
6. Communication
7. Error Detection
8. Resource allocation
9. Accounting
10. Security
14. Define Kernel[R]
The kernel is a software code that resides in the central core of a operating
system. It has complete control over the system.
15. Define system call. (MAY/JUNE 2009, APRIL/MAY 2019) [R]
System Call provides the interface between running program and the OS
User can request any services from OS through System Call.
Categories of system call:-
File management
Process Management
Inter process Communication
I/O Device Management
Information Processing & Maintenance
16. What is System Programs? (APRIL/MAY 2011) [R]
System programs provides an convenient environment to the user for developing
and executing the programs.
Categories:-
1. File management
2. Status Information
3. File Modification
4. Programming language support
5. Program loading & execution
6. Communication
17. What is Boot strapping? [R]
The boot program is stored on disk with predetermined address called boot sector.
The boot program then loads the operating system into memory to startup the computer
this arrangement is known as bootstrapping.
18. Difference b/w Monolithic & Microlithic. [An]
Access to a hardware devices such as a printer, scanner etc. requires a system call.
41.What is dual mode operation and what is the need of it?(APRIL/MAY 2019)
In monitor mode, the CPU can use all instructions and access all areas of
memory.
In user mode, the CPU is restricted to unprivileged instructions and a specified area
of memory. User code should always be executed in user mode and the OS design
ensures that it is.
42.Distinguish between Multicore and Multiprocessor. (NOV/DEC 2021)
Multicore systems have a single processor with multiple processing units. These
processing units are termed cores. On the other hand, multiprocessor systems have
two or more processors. A multiprocessor system is much more reliable than a
multicore system but a multiprocessor system has a complex configuration compared
to a multicore system. Both multicore processors and multiprocessors are used to
speeding up the computing process of the system.
PART – B &C
1. Explain Operating System Structure and components. [R] (APRIL/MAY 2010,
NOV/DEC 2013)
2. Discuss multiprocessor systems in detail. [U] (MAY/JUNE 2013)
3. Explain in detail the types of system calls provided by a typical operating system.
[R] (NOV/DEC 2012)
4. Explain the purpose of system calls and discuss the calls related to device management
and communications in brief. [An] (MAY/JUNE 2014)
5. Explain the concepts of virtual machines, their implementation and benefits in
details.[An] (MAY/JUNE 2014)
6. What is a virtual machine? List out the advantages of virtualization. Explain the
creation of a Virtual machine with a architecture diagram [An] (NOV/DEC 2013)
7. Write short notes on operating system services and components. [U] (MAY/JUNE
2012)
8. Write in detail about the real time system and multiprocessor system. [U]
9. Explain the various types of System calls with an example for each?[U] (APR/MAY
2015)
10. Discuss about the functionality of system boot with respect to operating system.
[An] (APR/MAY 2015)
11. Discuss about the evolution of virtual machines. Also explain how virtualization
could be implemented in operating systems. [Ap] (APR/MAY 2015)
12. Sketch the structure of Direct Memory Access in detail. [U] (APR/MAY 2015)
13. (i) With neat sketch discuss computer system overview
(ii) Enumerate the different operating system structure and explain with neat sketch.
[U] (Nov/Dec 2015)
14. (i) State the basic functions of OS and DMA.
(ii) Explain system calls, system programs and OS generation. [U] (Nov/Dec 2015)
15.(i) Distinguish between the client-server and peer-to-peer models of distributed
systems.
(ii) Describe three general methods for passing parameters to the operating system
with example. [An] (MAY/JUNE 2016)
16.(i) How could a system be designed to allow a choice of operating systems from
which to boot? What would the bootstrap program need to do? [Ap]
(ii) Describe the differences between symmetric and asymmetric multiprocessing.
What are three advantages and one disadvantage of multiprocessor systems? [An]
(MAY/JUNE 2016)
17.(i) Describe a mechanism for enforcing memory protection in order to prevent a
program from modifying the memory associated with other programs (8)[An]
(NOV/DEC 2016)
(ii)What are the advantages and disadvantages of using the same system call interface
for manipulating both files and devices? (8) [An] (NOV/DEC 2016)
18.(i) State and explain the major activities of an operating system with regard to file
management? (8) [U] (NOV/DEC 2016)
(ii)Discuss the different multiprocessor organizations with block diagrams [An] (8)
(NOV/DEC 2016)
19.(i)Explain the concept of multiprocessor and Multicore organizations (7) [U]
(APR/MAY 2017)
(ii) Discuss about direct memory access (6) [U] (APR/MAY 2017)
20.(i) Explain the various structures of an operating system (8) [U](APR/MAY 2017)
(ii)Describe system calls and system programs in detail with neat sketch (5)
[An] (APR/MAY 2017)
21. Explain Cache memory and its mapping. [U](13) (NOV/DEC 2017)
22. Describe evolution of operating system. [U](13) (NOV/DEC 2017)
23. State the operating system structure. Describe the operating-system operations in
detail. Justify the reason why the lack of a hardware-supported dual mode an cause
serious shortcoming in an operating system? (13) [U] (APR/MAY 2018)
24. i) Give reason why caches are useful. What problems do they solve? What problems
do they cause? If a cache can be made as large as the device for which it is caching why
not make it that large and eliminate the device? [An](8)
ii) Describe the major activities of operating system with regards to file management.
[U](5) (APR/MAY 2018)
25. Explain in detail the difference architecture of OS starting from simple structure,
Layered structure, micro kernel, modules and hybrid system with suitable example OS
structures, including Google‘s android. (13) (APR/MAY 2019)
26. (i) Discuss the pros and cons of single processor system, multi core system and
clustered system. (8)
(ii) Explain the steps involved to transfer the stored historical information in a
magnetic tapes to the CPU for further processing through various storage device.(5)
(APR/MAY 2019)
27. (i) Explain important and need of cache with its working principle. (7) (NOV/DEC
2021)
(ii) What is function of DMA operation? Explain with neat diagram. (6)
28. (i) Discuss in detail about the varies memory hierarchies with neat block diagram. (7)
(ii) Discuss about the functionality of system boot with respect to operating
system. (6) (NOV/DEC 2021)
UNIT II PROCESS MANAGEMENT 11
Processes - Process Concept - Process Scheduling - Operations on Processes - Inter- process Com
detection, Recovery from deadlock.
PART – A
1. Define Process?[R]
A Process can be thought of as a program in execution. A process will need certain
resources such as CPU time, memory, files & I/O devices to accomplish its task.
Draw & briefly explain the process states?[U] or Name and draw five different
process states with proper definition. (NOV/DEC 2017)
Process state
Process number
Program counter
CPU registers
Memory limits
List of open files
CPU scheduling information
Memory management information
Accounting information
I/O status information
31
6 When one thread is paused due to some When one thread is paused, the system
reason, other threads run as normal. waits until this thread is resumed.
52. List out the benefits and challenge of thread handling. (APR/MAY 2019)
Benefits
Responsiveness.
Resource sharing
Economy
Scalability.
Challenges
Dividing activities
Balance
Data splitting
Data dependency
Testing and debugging
PART-B&C
1) Explain the FCFS, preemptive and non-preemptive versions of Shortest-Job First and
Round Robin (time slice = 2) scheduling algorithms with Gantt charts for the four
Processes given. Compare their average turnaround and waiting time. [E] (NOV/DEC
2012)
Process Arrival Time Waiting Time
P1 0 8
P2 1 4
P3 2 9
P4 3 5
2) Discuss how scheduling algorithms are selected for a system. What are the
criteria considered? Explain the different evaluation Methods.[An] (MAY/JUNE
2014)
3) Write in detail about several CPU scheduling algorithms. [An] (APRIL/MAY2011)
4) What is critical section? Specify the requirements for a solution to critical
section problem. [An] (NOV/DEC 2012)
5) How monitors help in process synchronization. [An] (NOV/DEC 2009)
12) Discuss the threading issues which are considered with multithreaded programs.
[An] MAY/JUNE 2014)(APRIL/MAY2011, MAY/JUNE 2012)
31) What is deadlock? What are the necessary conditions for deadlock to occur? Explain
the deadlock prevention method of handling deadlock. (15)[An] (APR/MAY 2017)
Consider the following information about resources in a system.
(i) There are two classes of allocatable resource labeled R1 and R2
(ii) There are two instances of each resource
(iii) There are four processes labeled p1 through p4
(iv) There are some resource instances already allocated to processes as follows:
One instance of R1 held by p2, another held by p3
One instance of R2 held by p1, another held by p4
(v) Some processes have requested additional resources, as follows:-
p1 wants one instance of R1 .
p3 wants one instance of R2
(1) Draw the resource allocation graph for this system
(2) What is the state (runnable, waiting) of each process? For each process that is
waiting indicate what it is waiting for
(3) Is this system deadlocked? If so, state which processes are involved. If not, give
an execution sequence that eventually ends, showing resource acquisition and release at
each step.
32) Consider the following system snapshot using data structures in the Banker‘s
algorithm, with resources A, B, C and D and process P0 to P4 : [E](NOV/DEC 2017)
40. (i) Consider two processes, p1 and p2 where p1 = 50, t1 = 25, p2 = -75 and t2 = 30. Can
these two processes be scheduled using rate-monotonic scheduling and earliest deadline
first scheduling. Illustrate your answer using Gantt charts. (10)
(ii) Explain in detail about paging in 32 bit and 64 bit architectures. (5) (APR/MAY
2019)
41. (i) Explain banker algorithm for deadlock avoidance with suitable example. (7)
(ii) A system has four processes and five resources. The current allocation and
maximum need are as follows (NOV/DEC 2021)
Buddy System: - The buddy system allocates memory from a fixed size segment
consists of physical contiguous pages. Memory is allocated using power-of-2. This
allocation satisfy request in units sized as a power of 2.
Slab Allocation:- A Slab is made up of one or more physically contiguous pages. A
cache consists of one or more slabs. The slab allocation uses caches to store kernel
Objects.
11. What is virtual memory? Mention its advantages. (NOV/DEC
2012) (MAY/JUNE 2014) [R]
Virtual memory is a technique that allows the execution of processes that may not be
completely in memory. It is the separation of user logical memory from physical
memory. This separation provides an extremely large virtual memory, when only a
smaller physical memory is available.
The main visible advantage of this scheme is that programs can be larger than physical
memory.
12. Define Demand paging and write advantages. [R]
Virtual memory is commonly implemented by demand paging. In demand paging,
the pager brings only those necessary pages into memory instead of swapping in a whole
process. Thus it avoids reading into memory pages that will not be used anyway,
decreasing the swap time and the amount of physical memory needed.
13. What is the purpose of paging the page tables? [R]
In certain situations the page tables could become large enough that by paging the
page tables, one could simplify the memory allocation problem (by ensuring that
everything is allocated as fixed-size pages as opposed to variable-sized chunks) and also
enable the swapping of portions of page table that are not currently used.
14. Compare paging with segmentation with respect to the amount of memory
required by the address translation structures in order to convert virtual addresses
to physical addresses. [An]
Paging requires more memory overhead to maintain the translation structures.
Segmentation requires just two registers per segment: one to maintain the base of the
segment and the other to maintain the extent of the segment.
Paging on the other hand requires one entry per page, and this entry provides the
physical address in which the page is located
15. What do you mean by thrashing? (APR/MAY 2015) [R] (APR/MAY 2019)
Thrashing is the coincidence of high page traffic and low CPU utilization.
16. How do you limit the effects of thrashing? [An]
To limit the effect of thrashing we can use local replacement algorithm. With Local
replacement algorithm, if the process starts thrashing, it cannot steal frames from
another process and cause the latter to thrash as well. The problem is not entirely solved.
Thus the effective access time will increase even for the process that is not thrashing.
17. What do mean by page fault? [R]
Page fault is the situation in which the page is not available whenever a processor
needs to execute it.
18. Differentiate between Global and Local page replacement algorithms. [An]
54
Downloaded from
EnggTree.com
www.EnggTree.com
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
55
Downloaded from
EnggTree.com
www.EnggTree.com
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
38. Define demand paging in memory management. What are the steps required to
handle a page fault in demand paging. (Nov/Dec 2015) [R]
A demand paging system is quite similar to a paging system with swapping where
processes reside in secondary memory and pages are loaded only on demand, not in
advance. When a context switch occurs, the operating system does not copy any of the
old program‘s pages out to the disk or any of the new program‘s pages into the main
memory Instead, it just begins executing the new program after loading the first page and
fetches that program‘s pages as they are referenced. While executing a program, if the
program references a page which is not available in the main memory because it was
swapped out a little ago, the processor treats this invalid memory reference as a page
fault and transfers control from the program to the operating system to demand the page
back into the memory.
39. How does the system detect thrashing? (May/Jun 2016) [An]
Thrashing is caused by under allocation of the minimum number of pages required by
a process, forcing it to continuously page fault. The system can detect thrashing by
evaluating the level of CPU utilization as compared to the level of multiprogramming. It
can be eliminated by reducing the level of multiprogramming.
40. Name two differences between logical and physical addresses. (May/Jun 2016)
[R]
A logical address does not refer to an actual existing address; rather, it refers to an
abstract address in an abstract address space. Contrast this with a physical address that
refers to an actual physical address in memory. A logical address is generated by the
CPU and is translated into a physical address by the memory management unit(MMU).
Therefore, physical addresses are generated by the MMU.
41. Why page are sizes always powers of 2? (NOV/DEC 2016)[An]
Paging is implemented by breaking up an address into a page and offset number. It is
most efficient to break the address into X page bits and Y offset bits, rather than perform
arithmetic on the address to calculate the page number and offset. Because each bit 25 26
56
Downloaded from
EnggTree.com
www.EnggTree.com
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
position represents a power of 2, splitting an address between bits results in a page size
that is a power of 2.
42. What is the purpose of paging the page tables (NOV/DEC 2016)[R]
A page table is the data structure used by a virtual memory system in a computer
operating system to store the mapping between virtual addresses and physical addresses.
Virtual addresses are used by the accessing process, while physical addresses are used by
the hardware, or more specifically, by the RAM subsystem.
43. What is the difference between a user-level instruction and a privilege
instruction? Which of the following instruction should be privileged and only
allowed to execute in kernel mode?[An]
(a) Load a value from a memory address to a general-purpose register
(b)Set a new value in the program counter (PC) register
(c)Turn off interrupts (APR/MAY 2017)
Privileged instruction
A privileged instruction is a processor op-code (assembler instruction) which can
only be executed in "supervisor" (or Ring-0) mode. These types
of instructions tend to be used to access I/O devices and protected data structures
from the windows kernel.
User Level instruction
User-level is generic and can run on any operating system.
Load a value from a memory address to a general-purpose register (User
Level Instruction)
Set a new value in the program counter (PC) register (User Level
Instruction)
Turn off interrupts (privilege Instruction)
44. Will optimal page replacement algorithm suffer from Belady‟s anamaly?
Justify your answer (APR/MAY 2017)[An]
57
Downloaded from
EnggTree.com
www.EnggTree.com
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
Downloaded from
EnggTree.com
www.EnggTree.com
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
What are the physical addresses for the logical addresses 3400 and 0110?
(APR/MAY 2019)
a. illegal reference; traps to operating system
b.2300+0110 = 2410
50. What is thrashing? and how to resolve this problem? (APR/MAY 2019)
In a virtual storage system (an operating system that manages its logical storage or
memory in units called pages), thrashing is a condition in which excessive paging
59
Downloaded from
EnggTree.com
www.EnggTree.com
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
operations are taking place. A system that is thrashing can be perceived as either a very
slow system or one that has come to a halt.
One of the recommended ways to eliminate thrashing is to add more memory to main
memory. Another way of resolving the issue of thrashing is by adjusting the size of the
swap file.
51. When trashing is used? (NOV/DEC 2021)
Refer pervious
52. What is demand paging? (NOV/DEC 2021)
Refer pervious
PART-B &C
1. Describe the hierarchical paging technique for structuring page tables. (8) [An]
(MAY/JUNE 2013)
2. What is the cause for thrashing? How does the system detect thrashing? Once it
detects, what can the system do to eliminate this problem? [An] (MAY/JUNE 2009)
3. Write in detail about Segmentation.[U] (NOV/DEC 2009)
4. Write in detail about Segmentation with Paging. [U] (APRIL/MAY2010)
5. Explain the segmentation with paging implemented in OS/2 32-bit IBM system.
Describe the following algorithms: [An] (APRIL/MAY2010)
a. First fit
b. Best Fit
c. Worst Fit
6. Explain how paging supports virtual memory. With a neat diagram explain how
logical address is translated into physical address. [An] (NOV/DEC 2012)
7. Explain the principles of segmented and paging implemented in memory with a
diagram. [U] (NOV/DEC2013)
8. Explain the segmentation with paging implemented in MULTICS system. [U]
9. Explain the various page table structures in detail. [U]
(APRIL/MAY2011)(MAY/JUNE 2014)
60
Downloaded from
EnggTree.com
www.EnggTree.com
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
10.Write short notes on LRU, FIFO and clock replacement strategies? [An]
(APRIL/MAY2010, APRIL/MAY2011)
11.Explain any four page replacement algorithms in detail? [An] (NOV/DEC 2009)
(NOV/DEC 2013)
12.(i)Why page sizes are always powers of 2?
(ii)Consider the following segment table:
Segment Base Length
i. 0 0219 600
ii. 1 2300 14
iii. 2 090 100
iv. 3 1327 580
v. 4 1952 96 [Ap] (APR/MAY 2019)
13.What are the physical addresses for the following logical addresses?
0430
110
2500
400
4112 [E]
14.What is thrashing? Explain the working set model in detail. [An] (MAY/JUNE 2009)
15.Given memory partitions of 100KB, 500KB, 200KB, 300KB and 600KB(in order),
how would each of the first-fit, best-fit and worst-fit algorithms place processes
of212KB, 417KB, 12KB and 426KB(in order)? Which algorithm makes the most
efficient use of memory? [Ap] (NOV/DEC 2008)
16.(i) Explain in briefly and compare, fixed and dynamic memory partitioning schemes.
(ii) Explain FIFO, optimal and LRU page replacement algorithms with an example
reference Strings. Mention the merits and demerits of each of the above algorithms.
[An] (NOV/DEC 2012)
17. Consider the following page reference string (MAY/JUNE 2012) (APR/MAY 2015)
61
Downloaded from
EnggTree.com
www.EnggTree.com
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
1,2,3,4,2,1,5,6,2,1,3,7,6,3,2,1,3,6.
How many page faults would occur for the following replacement algorithms,
assuming one, two, three and four frames?
i) LRU replacement
ii) FIFO replacement
iii) Optimal replacement [E]
18.(i) Consider the following page reference string:
i. 2, 1, 0, 3, 4, 0, 0, 0, 2, 4, 2, 1, 0, 3, 2.
How many page faults would occur if the working set policy were used with a
window size of 4? Show when each page fault would occur clearly. [E]
(ii) What is meant by thrashing? Discuss in detail. [An] (MAY/JUNE 2013)
19.Explain the concept of demand paging in detail with neat diagram.[U] (MAY/JUNE
2014)
20. Why are translation look-aside buffers important? Explain the details stored in a TLB
table entry? [An] (MAY/JUNE 2014)
21. Consider the following page reference string :
1,2,3,4,2,1,5,6,1,2,3,7,6,3,2,1,2,3,6.How Many page faults would occur for the LRU,
FIFO, LFU and optimal page replacement algorithms, assuming two and five frames?
[E] (MAY/JUNE 2014)
22. Explain the concept of demand paging and the performance issue of short process
Explain the issue of demand paging [An] (NOV/DEC 2013)
23. With a neat sketch, explain how logical address is translated into physical address
using paging mechanism? [An] (APR/MAY 2015)
24. Write short notes on Memory Mapped Files. [U] (APR/MAY 2015)
25.(i) Consider the following page reference string:
1,2,3,2,5,6,3,4,6,3,7,3,1,5,3,6,3,4,2,4,3,4,5,1
62
Downloaded from
EnggTree.com
www.EnggTree.com
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
Indicate page faults and calculate total number of page faults and successful ratio for
FIFO, optimal and LRU algorithms. Assume there are four frames and initially all the
frames are empty. [E]
(ii) Explain the effect of thrashing. [An] (NOV/DEC 2015)
26.Discuss the given memory management techniques with diagrams.
a. Partition Allocation Methods
b. Paging and Translation Look-aside Buffer. [An] (NOV/DEC 2015)
27.(i) Describe a mechanism by which one segment could belong to the address space of
two different processes.
(ii) Why are segmentation and paging sometimes combined into one scheme? Explain
them in detail with example. [An] (MAY/JUNE 2016)
28.(i) Under what circumstances do page faults occur? Describe the actions taken by the
operating system when a page fault occurs.
(ii) Discuss situations in which the least frequently used (LFU) page replacement
algorithm generates fewer page faults than the least recently used (LRU) page
replacement algorithms. Also discuss under that circumstances the opposite holds
good. [An] (MAY/JUNE 2016)
29.(i) What is the copy-on-write feature, and under what circumstances is its use
beneficial? Why hardware support is required to implement this feature? (8) [An]
(NOV/DEC 2016)
(ii) Consider a system that allocates pages of different sizes to its processes. What are
the advantages of such a paging scheme? What modifications to the virtual memory
system provide this functionality? (8) [U] (NOV/DEC 2016)
30.(i) Explain the difference between internal and external fragmentation (8) [An]
(NOV/DEC 2016)
(ii) Discuss situations in which the most frequently used (MFU) page replacement
algorithm generates fewer page faults than the least recently used (LRU) page-
63
Downloaded from
EnggTree.com
www.EnggTree.com
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
replacement algorithm. Also discuss under what circumstances the opposite holds. (8)
[An] (NOV/DEC 2016)
31. Discuss the given memory management techniques with diagrams
(i) Partition Allocation Methods
(ii) Paging and Translation Look-aside Buffer [U] (APR/MAY 2017)
32.(i)Describe about free space management on I/O buffering and blocking(7)[U]
(APR/MAY 2017)
(ii)Discuss the concept the buddy system allocation with neat sketch (6) [U]
(APR/MAY 2017)
33. Draw the diagram of segmentation memory management scheme and explain
its principle.(13) [U](NOV/DEC 2017)
34. When do page faults occur ? Consider the reference string : [E] (NOV/DEC 2017)
1, 2, 3, 4, 2, 1, 5, 6, 2, 1, 2, 3. 7, 6, 3, 2, 1, 2, 3, 6.
How many page faults and page fault rate occur for the FIFO, LRU and optimal
replacement algorithms, assuming one, two, three, four page frames?
35. Explain why sharing a reentrant module is easier when segmentation is used
than when pure paging is used with example.[U] (APR/MAY 2018)
36. Discuss situation under which the most frequently used page replacement algorithm
generates fewer page faults than the least recently used page replacement algorithm.
Also discuss under which circumstances the opposite holds.[U](APR/MAY 2018)
37. (i) Consider a computer system with 16 bit logical address and 4 KB page size. The
system supports up to 1 MB of physical memory. Assume that the actual process size is
only 33 KB, page table base register contains 1000 and free frame list contains
13,1,9,7,5,3,1,2,4,6,8.
Construct the physical and logical memory structures page table of the corresponding
process.
Find the physical address of 13,256 and another logical address with page number 2 and
offset of 128.
64
Downloaded from
EnggTree.com
www.EnggTree.com
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
Discuss about the possible valid invalid bit and possible protection bits in page table.
(ii) Consider a paging system with page table stored in memory.
1) If a memory reference takes 50 ns, how long does a paged memory reference take?
2) If we add TLB and 75% of all page table reference are found in TLB what is the
effective memory reference time. (13) (APR/MAY 2019)
38. (i) Explain the global and local frame allocation algorithms and their pros and cons.
(3)
(ii)Consider the following page reference string.
1, 2 5,4 24, 5, 6 2s, 2-3, 74, 3, 21, 2-358
3) How many page faults would occur for the following replacement algorithms,
assuming 1. and 3 free frames. Remember that all frames are initially empty so
that first unique page request will all cost one fault each. LRU a FIFO, Optimal
replacement, LFU and MFU. (10) (APR/MAY 2019)
27.(i) Compare paging with segmentation in terms of memory requirement by the
address translation structure in order to convert virtual addresses to physical memory.
(ii) Explain in detail about page replacement algorithm with suitable example.
(NOV/DEC 2021)
28.With a neat diagram. discuss about a mechanism of paging scheme. (NOV/DEC
2021)
65
Downloaded from
EnggTree.com
www.EnggTree.com
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
PART-A
1) What is a file? [R]
A file is a named collection of related information that is recorded on secondary
storage. A file contains either programs or data. A file has certain "structure" based on its
type.
2) List the various file attributes. (APRIL/MAY 2011, NOV/DEC
2012)(MAY/JUNE 2014)(APRIL/MAY 2015) [R]
A file has certain other attributes, which vary from one operating system to another,
but typically consist of these:
Identifier
Name
Type
Location
Size
Protection
Time
Date
User identification
3) What are the various file operations? (NOV/DEC 2012, APRIL/MAY 2015) [R]
The six basic file operations are:
Creating a file
66
Downloaded from
EnggTree.com
www.EnggTree.com
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
Writing a file
Reading a file
Repositioning within a file
Deleting a file
Truncating a file
4) What are all the information‟s associated with an open file? [R]
Several pieces of information are associated with an open file which may be:
File pointer
File open count
Disk location of the file
Access rights
5) What are the different accessing methods of a file? (APRIL/MAY 2010) [R]
The different types of accessing a file are:
Sequential access: Information in the file is accessed sequentially
Direct access: Information in the file can be accessed without any particular order.
Other access methods: Creating index for the file, indexed sequential access
method (ISAM),etc.
6) What is Directory? [R]
The device directory or simply known as directory records information-such as
name, location, size, and type for all files on that particular partition. The directory can
be viewed as a symbol table that translates file names into their directory entries.
7) What are the operations that can be performed on a directory? [R]
The operations that can be performed on a directory are
Search for a file
Create a file
Delete a file
Rename a file
67
Downloaded from
EnggTree.com
www.EnggTree.com
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
List directory
Traverse the file system
8) What are the most common schemes for defining the logical structure of
a directory? [R] (MAY/JUNE 2012)
The most common schemes for defining the logical structure of directory
Single-Level Directory
Two-level Directory
Tree-Structured Directories
Acyclic-Graph Directories
General Graph Directory
9) Define UFD and MFD. [R]
In the two-level directory structure, each user has her own user file directory
(UFD). Each UFD has a similar structure, but lists only the files of a single user. When
a job starts the system's master file directory (MFD) is searched. The MFD is indexed
by the user name or account number, and each entry points to the UFD for that user.
10) What is a path name? [R]
A pathname is the path from the root through all subdirectories to a specified file.
In a two-level directory structure a user name and a file name define a path name.
11) What are the various layers of a file system? [R]
The file system is composed of many different levels. Each level in the design
uses the feature of the lower levels to create new features for use by higher levels.
i. Application programs
ii. Logical file system
iii. File-organization module
iv. Basic file system
v. I/O control vi Devices
68
Downloaded from
EnggTree.com
www.EnggTree.com
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
69
Downloaded from
EnggTree.com
www.EnggTree.com
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
Linked allocation
Indexed allocation
16) What are the advantages of Contiguous allocation? [R]
The advantages are
Supports direct access
Supports sequential access
Number of disk seeks is minimal.
17) What are the drawbacks of contiguous allocation of disk space? [R]
The disadvantages are
Suffers from external fragmentation.
Suffers from internal fragmentation.
Difficulty in finding space for a new file.
File cannot be extended.
Size of the file is to be declared in advance.
18) What are the disadvantages of linked allocation? [R]
The disadvantages are
Used only for sequential access of files.
Direct access is not supported.
Memory space required for the pointers.
Reliability is compromised if the pointers are lost or damaged
19) What are the advantages of Indexed allocation? [R]
The advantages are
No external-fragmentation problems.
Solves the size-declaration problems.
Supports direct access.
70
Downloaded from
EnggTree.com
www.EnggTree.com
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
20) How can the index blocks be implemented in the indexed allocation
scheme? [R]
The index block can be implemented as follows
Linked scheme
Multilevel scheme
Combined scheme
21) What is garbage collection? (MAY /JUNE 2012 ) [R]
Garbage Collection (GC) is a form of automatic memory management. The
garbage collector, or just collector, attempts to reclaim garbage, or memory occupied by
objects that are no longer in use by the program.
22) Mention the objectives of File Management System. (APR/MAY 2010) [R]
The system that an operating system or program uses to organize and keep track of
files. For example, a hierarchical file system is one that uses directories to organize files
into a tree structure.
23) What is the content of a typical file control block? (APR/MAY 2011,
APR/MAY 2010) [R]
File permissions
File dates (create, access,
write)
File owner, group, ACL
File size
File data blocks
File Control Block (FCB) is a file system structure in which the state of an open
file is maintained.
24) What are the two types of system directories? (MAY/JUNE 2012) [R}
Device directory, describing physical properties of files.
71
Downloaded from
EnggTree.com
www.EnggTree.com
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
29) What are the information contained in a boot control block and
partition control block? (MAY/JUNE 2014) [R]
Boot control block:
Contain information needed by the system to boot an operating from that partition.
If the disk does not contain an operating system, this block can be empty. It is typically
the first block of a partition. In UFS, this is called the boot block.
Partition Control block:
Contains partition details, such as number of blocks in the partition, size of the
blocks, free block count and free block pointers, and free FCB count and FCB pointers.
30) Define buffering. [R]
A buffer is a memory area that stores data while they are transferred between
two devices or between a device and an application. Buffering is done for three reasons
a. To cope with a speed mismatch between the producer and consumer of a data stream
b. To adapt between devices that have different data transfer sizes
c. To support copy semantics for application I/O
31) Define caching. [R]
A cache is a region of fast memory that holds copies of data. Access to the
cached copy is more efficient than access to the original. Caching and buffering are
distinct functions, but sometimes a region of memory can be used for both purposes.
32) Define spooling. [R]
A spool is a buffer that holds output for a device, such as printer, that cannot
accept interleaved data streams. When an application finishes printing, the spooling
system queues the corresponding spool file for output to the printer. The spooling
system copies the queued spool files to the printer one at a time.
33) Define rotational latency and disk bandwidth. (NOV/DEC 2010, MAY/JUNE
2013) [R]
Rotational latency is the additional time waiting for the disk to rotate the desired
sector to the disk head.
73
Downloaded from
EnggTree.com
www.EnggTree.com
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
Disk bandwidth is the total number of bytes transferred, divided by the time
between the first request for service and the completion of the last transfer.
34) What are the various disk-scheduling algorithms? [R]
The various disk-scheduling algorithms are
First Come First Served Scheduling
Shortest Seek Time First Scheduling
SCAN Scheduling
C-SCAN Scheduling
35) What is the need for disk scheduling? (NOV/DEC 2012) [R]
In operating systems, seek time is very important. Since all device requests are
linked in queues, the seek time is increased causing the system to slow down.
Disk Scheduling Algorithms are used to reduce the total seek time of any request.
36) What is low-level formatting? [R]
Before a disk can store data, it must be divided into sectors that the disk
controller can read and write. This process is called low-level formatting or physical
formatting. Low-level formatting fills the disk with a special data structure for each
sector. The data structure for a sector consists of a header, a data area, and a trailer.
37) What is the use of boot block? [R]
For a computer to start running when powered up or rebooted it needs to have an
initial program to run. This bootstrap program tends to be simple. It finds the
operating system on the disk loads that kernel into memory and jumps to an initial
address to begin the operating system execution. The full bootstrap program is stored in
a partition called the boot blocks, at fixed location on the disk. A disk that has boot
partition is called boot disk or system disk.
38) What is sector sparing? [R]
Low-level formatting also sets aside spare sectors not visible to the operating
system. The controller can be told to replace each bad sector logically with one of the
74
Downloaded from
EnggTree.com
www.EnggTree.com
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
75
Downloaded from
EnggTree.com
www.EnggTree.com
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
Swap-space use: The operating system needs to release sufficient main memory
to bring in a process that is ready to execute. Operating system uses this swap space in
various ways. Paging systems may simply store pages that have been pushed out of main
memory. UNIX operating system allows the use of multiple swap spaces. These swap
space are usually put on separate disks, so the load placed on the I/O system by paging
and swapping can be spread over the systems I/O devices.
Swap-space location: Swap space can reside in two places:
1. Separate disk partition
2. Normal file system
44) Write three basic functions which are provided by the hardware clocks
and timers. (APRIL/MAY 2011) [R]
OSTickInit()
OSTimeSet()
OSTimeGet()
45) What are the advantages of Linked allocation? [R]
The advantages are
No external fragmentation.
Size of the file does not need to be declared.
46) Define FAT(NOV/DEC 2014) [R]
FAT is a much older file-system format that is understood by many systems
besides Windows, such as the software running on cameras. A disadvantage is that the
FAT file system does not restrict file access to authorized users. The only solution for
securing data with FAT is to run an application to encrypt the data before storing it on the
file system.
47) What is Relative block number? (NOV/DEC 2014) [R]
Relative block number is an index relative to the beginning of a file. Thus the 1st
relative block of the file is 0, the next is 1, and so on.
76
Downloaded from
EnggTree.com
www.EnggTree.com
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
77
Downloaded from
EnggTree.com
www.EnggTree.com
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
51) Identify the two important functions of Virtual File System (VFS) layer in the
concept of file system implementation. (Nov/Dec 2015) [R]
Linux VFS provides a set of common functionalities for each files system, using
function pointers accessed through a table. The same functionality is accessed through
the same table position for all file system types, though the actual functions pointed to by
the pointers may be files system-specific. Common operations provided include open( ),
read( ), write( ), and mmap( ).
52) How does DMA increase system concurrency? (May/Jun 2016)[An]
DMA increases system concurrency by allowing the CPU to perform tasks while the
DMA system transfers data via the system and memory buses. Hardware design is
complicated because the DMA controller must be integrated into the system and the
system must allow the DMA controller to be a bus master.
53) Why rotational latency is usually not considered in disk scheduling?
(May/Jun 2016)[An]
Most disks do not export their rotational position information to the host. Even if they
did, the time for this information to reach the scheduler would be subject to imprecision
and the time consumed by the scheduler is variable, so the rotational position information
would become incorrect. Further, the disk requests are usually given in terms of logical
block numbers, and the mapping between logical blocks and physical locations is very
complex.
54) Define C-SCAN scheduling (NOV/DEC 2016)[R]
In the C-Scan all the Processes are Arranged by using Some Circular List. Circular
List is that in which there is no start and end point of the list means the End of the List is
the Starting Point of the list. In the C-Scan Scheduling the CPU will search for the
Process from Start to end and if an End has Found then this again start from the Starting
Process.
78
Downloaded from
EnggTree.com
www.EnggTree.com
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
55) Why it is important to scale up system –bus and device speeds as CPU speed
increases? (NOV/DEC 2016)[An]
Consider a system which performs 50% I/O and 50% computers. Doubling the CPU
Performance on this system would increase the total system performance by only 50%.
Doubling both system aspects would increase performance by 100%.Generally,it is
important to remove the current system bottleneck and to increase overall system
performance rather than blindly increasing the performance of individual system
components.
56) Suppose that the disk rotates at 7200 rpm. What is the average rotational
latency of the disk drive? (APR/MAY 2017) [E]
Average disk access time=average seek time+ average rotational delay + transfer
time + controller overhead.
Downloaded from
EnggTree.com
www.EnggTree.com
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
Therefore We can seek over 195 tracks(about 4% of the disk) during an average
rotational latency
59) Enlist different types of directory structure. [R](NOV/DEC 2017)
There are many types of directory structure in Operating System. They are as follows
:- 1) Single Level Directory
2) Two Level Directory
3) Tree Structured Directory
4) Acyclic Graph Directory
5) General Graph Directory
60) State the typical bad-sector transactions. [R] (APR/MAY 2018)
Typical bad sector transactions might be as follows :
The OS tries to read logical block.
The controller calculates the ECC and finds that the sector is bad. It reports this
finding to the OS.
The next time that the system is rebooted ,a special command is run to tell the
SCSI controller to replace the bad sector with a spare.
After that, whenever the system requests logical block, the request is translated
into the replacement sector‘s address by the controller.
61) What is the advantage of bit vector approach in free space management ? [R]
(APR/MAY 2018)
Advantages of bit vector approach:
Relatively simple
Efficient to find the first free blocks or n consecutive free blocks on the disk
62. Write short notes on file system mounting. (APR/MAY 2019)
The mount procedure is straightforward. The operating system is given the name
of the device and the mount point—the location within the file structure where the file
system is to be attached. Some operating systems require that a file system type be
80
Downloaded from
EnggTree.com
www.EnggTree.com
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
provided, while others inspect the structures of the device and determine the type of file
system. Typically, a mount point is an empty directory.
63. What is SSD? (APR/MAY 2019)
The highest level, the operating system may maintain a cache of file-system data
in main memory. In addition, electronic RAM disks (also known as solid-state disks)
may be used for high-speed storage that is accessed through the file-system interface.
64. Enlist different types of file directory structure. (NOV/DEC 2021)
65. Is FAT file system advantageous? Justify. (NOV/DEC 2021)
PART-B&C
1) Explain the different disk scheduling algorithms with examples. [An] (APRIL/MAY
2010, MAY/JUNE 2012, APRIL/MAY 2011, MAY/JUNE 2013) (MAY/JUNE 2014)
2) Explain and compare FCFS, SSTF, C-SCAN and C-LOOK disk scheduling algorithms
with examples. [An] (NOV/DEC 2012)
3) Write short notes on disk management. [U] (NOV/DEC 2009)
4) Write short notes on file system in Linux. [U] (NOV/DEC 2009) (NOV/DEC 2014)
5) Write an elaborate note on RAID and RAID Levels. [U] (APRIL/MAY 2010,
MAY/JUNE 2012, NOV/DEC 2012, MAY/JUNE 2013)
6) Explain the services provided by Kernel I/O subsystem. [An] (APRIL/MAY 2010,
APRIL/MAY 2011, NOV/DEC2012, MAY/JUNE 2013)
7) Consider the following I/O scenarios on a single-user PC.
A mouse used with a graphical user interface.
A tape drive on a multitasking operating system (assume no device preallocation is
available)
A disk drive containing user files.
A graphics card with direct bus connection, accessible through memory-mapped
I/O For each of these I/O scenarios, would you design the operating system to use
81
Downloaded from
EnggTree.com
www.EnggTree.com
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
83
Downloaded from
EnggTree.com
www.EnggTree.com
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
(iii) Could a RAID level 1 organization achieve better performance for read
requests than a RAID level 0 organizations? If so, how? [An] (MAY/JUNE
2016)
30) (i) Describe some advantages and disadvantages of using SSDs as a caching tier
and as a disk-drive replacement compared with using only magnetic disks. (8) [An]
(NOV/DEC 2016)
(ii) Discuss how performance optimizations for file systems might result in
difficulties in maintaining the consistency of the systems in the event of computer
crashes (8) [U] (NOV/DEC 2016)
31) (i) Distinguish between a STREAMS driver and a STREAMS module (8) [An]
(NOV/DEC 2016)
(ii) Could a RAID level l organization achieve better performance for read requests than
a RAID level 0 organization? If so, how? Explain. (8) [An](NOV/DEC 2016)
32) (i) Discuss about the various file access methods (7) [U] (APR/MAY 2017)
(ii)With neat sketch explain about the Directory structure, File Sharing (6) [U]
(APR/MAY 2017)
33) (i) Explain about kernel I/O subsystem and transforming I/O to hardware
operations (7) [U] (APR/MAY 2017)
34) (ii) On a disk with 1000 cylinders, numbers 0 to 999, Compute the number of tracks
the disk arm must move to satisfy the entire request in the disk queue. Assume the last
received was at track 345 and the head is moving towards track 0.The queue in FIFO
order contains requests for the following tracks. 123,874,692,475,105 and 376.Find the
seek length for the following scheduling algorithm. (1) SSTF (2) LOOK (3) CSCAN
[An] (APR/MAY 2017)
35) (i)In a variable partition scheme the operating system has to keep track of allocated
and free space. Suggest a means of achieving this. Describe the effects of new allocations
and process terminations in your suggested scheme.(5) [An] (NOV/DEC 2017)
84
Downloaded from
EnggTree.com
www.EnggTree.com
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
(ii)What are different allocation methods in disk storage? Explain with neat sketch.
(8)
36) Consider a disk queue with requests for I/O to blocks on
cylinders 93,183, 37,122, 14, 124, 65, 67
If the disk head is start at 53, then find out the total head movement with respect to
FCFS,SSTF, SCAN,C-SCAN and LOOK scheduling.(13) [E] (NOV/DEC 2017)
37) What are the various disk space allocation methods? Explain any two in detail.
[U] (APR/MAY 2018)
38) State and explain the FCFS, SSTF and SCAN disk scheduling with examples.
[U] (APR/MAY 2018)
39. Suppose that a disk drive has 5000 cylinders, numbered 0 through 4999. The drive is
serving a request at cylinder 143. The queue of pending requests, in FIFO order is 86,
1470, 913, 1774, 948, 1509, 1022, 1750, 130 Starting from the head position what is the
total distance (in cylinders) that the disk arm moves to satisfy all the pending requests for
each of the following disk-scheduling algorithms? FCFS, SSTF, SCAN, LOOK, C-
SCAN C-LOOK. Explain the pros and cons of all disks scheduling algorithms. (13)
(APR/MAY 2019)
40. (i) Explain in detail the various allocation methods with their pros and cons. (8)
(ii) Brief the various procedures need to be followed ‗in disk management. (5)
(APR/MAY 2019)
41.(i) What do you mean by directory structure? Also discuss Tree-Structure Directories
and Acyclic-Graph Directories. (7) (NOV/DEC 2021)
(ii) Describe in details about file system implementation and file allocation method
(6).
42. Suppose that a disk drive has 200 cylinder, numbered 0 to 199. The work queue is:
23,89,132,42,187. Determine the total distance for the following disk scheduling
algorithms
(i) SCAN (ii) LOOK (iii) C-SCAN (iv) C-LOOK
85
Downloaded from
EnggTree.com
www.EnggTree.com
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
86
Downloaded from
EnggTree.com
www.EnggTree.com
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
PART-A
1) What is Linux distribution?[R]
A Linux distribution includes all the standard components of the Linux system,
plus a set of administrative tools to simplify the initial installation and subsequent
upgrading of Linux and manage installation and removal of other packages on the
system.
2) What is the use of User mode? [R]
Under Linux, no user code is built into the kernel. Any operating-system-support
code that does not need to run in kernel mode is placed into the system libraries and runs
in user mode.
3) What are the components of kernel mode[R]
The module support under Linux has four components:
1. The module-management system allows modules to be loaded into memory
and to communicate with the rest of the kernel.
2. The module loader and unloader, which are user-mode utilities, work with the
module-management system to load a module into memory.
3. The driver-registration system allows modules to tell the rest of the kernel that
a new driver has become available.
4. A conflict-resolution mechanism allows different device drivers to reserve
hardware resources and to protect those resources from accidental use by another driver.
4) What is process Identity? [R]
Each process has a unique identifier. The PID is used to specify the process to the
operating system when an application makes a system call to signal, modify, or wait for
87
Downloaded from
EnggTree.com
www.EnggTree.com
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
the process. Additional identifiers associate the process with a process group (typically, a
tree of processes forked by a single user command and login session.
5) Define DNS[R]
The Domain Name System (DNS) provides host-name-to-network-address
translations for the entire Internet. Before DNS became widespread, files containing the
same information were sent via e-mail or ftp between all networked hosts.
6) What is virtualization? [R]
Virtualization, in computing, refers to the act of creating a virtual (rather than
actual) version of something, including but not limited to a virtual computer hardware
platform, operating system (OS), storage device, or computer network resources.
7) What is pluggable authentication modules [R]
The pluggable authentication modules (PAM) system is based on a shared library
that can be used by any system component that needs to authenticate users. An
implementation of this system is available under Linux. PAM allows authentication
modules to be loaded on demand as specified in a system-wide configuration file. If a
new authentication mechanism is added at a later date, it can be added to the
configuration file, and all system components will immediately be able to take advantage
of it. PAM modules can specify authentication methods, account restrictions, session
setup functions, and password-changing functions (so that, when users change their
passwords, all the necessary authentication mechanisms can be updated at once).
8) What is the use of firewall manager[R]
The firewall manager maintains a number of separate firewall chains and allows a
skbuff to be matched against any chain. Chains are reserved for separate purposes: one is
used for forwarded packets, one for packets being input to this host, and one for data
generated at this host. Each chain is held as an ordered list of rules, where a rule specifies
one of a number of possible firewall-decision functions plus some arbitrary data for
matching purposes.
88
Downloaded from
EnggTree.com
www.EnggTree.com
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
89
Downloaded from
EnggTree.com
www.EnggTree.com
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
4. Knowledge in shell programming and architecture is valued very much in the job
market. If you know Buorne or Korn well, you can even score a high-paying salary with
minimal experience.
5. Storage technologies like FC, NFS or iSCSI is great, while knowledge regarding
backup technologies is a must for a system administrator.
13) State the components of a Linux System? (May/Jun 2016)[R]
Kernel: The kernel is responsible for maintaining all the important abstractions of the
operating system, including such things as virtual memory and processes.
System libraries: The system libraries define a standard set of functions through
which applications can interact with the kernel. These functions implement much of the
operating-system functionality that does not need the full privileges of kernel code.
System utilities: The system utilities are programs that perform individual,
specialized management tasks. Some system utilities are invoked just once to initialize
and configure some aspect of the system.
14) Define the function of Caching-only servers. (May/Jun 2016)[R]
All DNS servers cache answers to queries they receive from outside their own
zone of authority. A cache-only DNS server is not authoritative for any zone. Related
Topics: DNS root servers: Root servers are critical to the function of a DNS server that is
directly connected to the Internet.
15) What is virtualization? (NOV/DEC 2016)[R]
In computing, virtualization refers to the act of creating a virtual (rather than
actual) version of something, including virtual computer hardware platforms, storage
devices, and computer network resources.
16) What scheduling algorithm is used in linux operating system to schedule jobs?
(NOV/DEC 2016)[R]
The Completely Fair Scheduler (CFS) Algorithm is used in Linux operating
system to schedule jobs.
90
Downloaded from
EnggTree.com
www.EnggTree.com
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
17) Mention any two features of Linux file systems. (APR/MAY 2017)[U]
Portable
Open Source
Multi user
Multi Programming
18) Enlist the advantages of using kernel modules in Linux (APR/MAY 2017)[U]
Loading and unloading a module is much more flexible and faster than
recompiling a kernel and rebooting.
You can try different options each time you load a module. Most drivers that
handle hardware will take options for I/O addresses, IRQ or DMA numbers, plus
more esoteric options like full or half duplex. When you have problems getting a
card to run correctly, the ability to try different options can save hours.
Makes it easier to maintain multiple machines on a single kernel base.
17) List the advantages of Linux OS.[U] (NOV/DEC
2017) Advantages of Linux OS:
Low cost
Stability
Performance
Security, Flexibility, Compatibility
18) Write the purpose of using virtualization.[R] (NOV/DEC 2017)
Operating system virtualization provides application-transparent virtualization to
users by decoupling applications from the OS. The OS virtualization technique offers
granular control at the application level by facilitating the transparent migration of
individual applications. OS virtualization can also be used to migrate critical applications
to another running operating system instance.
91
Downloaded from
EnggTree.com
www.EnggTree.com
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
19) List the advantages and disadvantage of writing an operating system in high
level language such as C.[R] (APR/MAY 2018)
The code can be written faster, is more compact, and is easier to understand and
debug. In addition, improvements in compiler technology will improve the generated
code for the entire operating system by simple recompilation. Finally, an operating
system is far easier to port to move to some other hardware if it is written in a higher-
level language
20) What is handle? How does a process obtain a handle? [U] (APR/MAY 2018)
The handle is an integer value in the operating system assigned to the associated
process when the process was started. The system uses this handle to keep track of
process attributes. An application can obtain a handle to a process that can be used as a
parameter to many process-information and control functions.
21. Write short notes on driver registration in Linux. (APR/MAY 2019)
The driver registration allows modules to tell the rest of the kernel that a new driver has
become available.
22. List out the methods used to recover from the deadlock. (APR/MAY 2019)
We can use a protocol to prevent or avoid deadlocks, ensuring that the system will never
enter a deadlocked state.
• We can allow the system to enter a deadlocked state, detect it, and recover.
• We can ignore the problem altogether and pretend that deadlocks never occur in the
system.
44.What are the Components of a Linux System?
Every OS has component parts, and the Linux OS also has the following components
parts:
Boot loader
OS Kernel
Background services
OS Shell
92
Downloaded from
EnggTree.com
www.EnggTree.com
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
Graphics server
Desktop environment
Applications.
45. Which layer of iOS contains fundamental system services for apps?
The Core Services layer contains the fundamental system services that all
applications use, The Core Services layer provides an abstraction over the services
provided in the Core OS layer. It provides fundamental access to iOS services and
consists of the following components:
Collections
Address Book
Networking
File Access
SQLite
Core Location
Net Services
Threading
Preferences
URL Utilities
PART-B & C
1. Explain in detail about the concepts of Linux system. [U]
2. Explain in detail about virtualization [U]
3. Explain in detail about setting up a Linux mainframe server [An]
4. Explain in detail about Linux host and adding guest OS [U]
5. Explain the significance and steps involved in setting up Xen, VMware software‘s
on Linux host for successful virtualization in detail. [An] May/June 2015
6. Briefly discuss about the requirements to become a Linux system administrator.
[An] May/June 2015
7. Discuss about the steps involved in the installation of a Linux Multifunction
server.
93
Downloaded from
EnggTree.com
www.EnggTree.com
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
95
Downloaded from
EnggTree.com
www.EnggTree.com
PANIMALAR INSTITUTE OF TECHNOLOGY DEPT OF CSE
20. i) Under what circumstance would an user process request an operation that results
in the allocation of a demand-zero memory region.(8)[An] (APR/MAY 2018)
ii) Describe an useful application of the no-access page facility provided in Window
XP.(5) [U] (APR/MAY 2018)
21. i) What optimization were used to minimize the discrepancy between CPU and
I/O speeds on early computer systems. [R](8)
ii) What manages cache in Windows XP ? How is cache managed?(5) [R]
(APR/MAY 2018)
22. Discuss the process and memory management in Linux. (13) (APR/MAY 2019)
23. Explain the architecture of iOS. Discuss the media and service layers clearly. (13)
(APR/MAY 2019)
24. (i) Explain in details about how process is managed and scheduled in linux?
(ii) Discuss about Inter Process Communication (IPC) in linux. (NOV/DEC 2021)
46. With frame work explain the working function of android operating system
architecture. Compare the feature of IoS and android. (13) (NOV/DEC 2021)
*************
96
Downloaded from
EnggTree.com