0% found this document useful (0 votes)
6 views6 pages

Os - 2 Marks

The document covers key concepts in memory management, storage management, and virtualization, including thrashing, swapping, TLB, demand paging, and fragmentation. It also discusses file systems, file attributes, virtual file systems, and hierarchical storage management. Additionally, it explains virtualization technologies, including guest operating systems, hypervisors, and live migration.

Uploaded by

drkavitha.jegan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views6 pages

Os - 2 Marks

The document covers key concepts in memory management, storage management, and virtualization, including thrashing, swapping, TLB, demand paging, and fragmentation. It also discusses file systems, file attributes, virtual file systems, and hierarchical storage management. Additionally, it explains virtualization technologies, including guest operating systems, hypervisors, and live migration.

Uploaded by

drkavitha.jegan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

UNIT III – MEMORY MANAGEMENT

1. How do you limit the effects of thrashing?


To limit the effect of thrashing we can use local replacement algorithm. With Local
replacement algorithm, if the process starts thrashing, it cannot steel frames from
another process and cause the latter to thrash as well. The problem is not entirely
solved. Thus, the effective access time will increase even for the process that is not
thrashing.

2. What is swapping and why is it required?


Definition: Method of temporarily removing inactive process (neither executing nor
performing I/O operation) from physical memory
Need for swapping: When there is a need for more physical memory space for a
process than what exists, there is a need for swapping.

3. Define TLB.
Translation Look-Aside Buffer, a table in the processors memory that contains
information about the pages in memory the processor has accessed recently.The TLB
enables faster computing because it allows the address processing to take place
independent of the normal address-translation pipeline

4. What is difference between demands paging and pure demand paging?


In demand paging, a page is not loaded into main memory until it is needed. In pure
demand paging, even a single page is not loaded into memory initially. Hence pure
demand paging causes a page fault.

5. What is Copy-on-write.
Copy-on-write finds its main use in virtual memory operating systems; when a process
creates a copy of itself, the pages in memory that might be modified by either the
process or its copy are marked copy-on-write.
[

6. Difference between internal and external fragmentation


Internal fragmentation is the area occupied by a process but cannot be used by the
process. This space is unusable by the system until the process release the space.
External fragmentation exists when total free memory is enough for the new process
but it's not contiguous and can't satisfy the request. Storage is fragmented into small
holes.

7. What is the use of lazy swapper.


Rather than swapping the entire process into main memory, a lazy swapper is used. A
lazy swapper never swaps a page into memory unless that page will be needed.

8. List two differences between logical and physical addresses.


A logical address does not refer to an actual existing address; rather, it refers to an
abstract address in an abstract address space. Contrast this with a physical address that
refers to an actual physical address in memory.
A logical address is generated by the CPU and is translated into a physical address by
the memory management unit(MMU). Therefore, physical addresses are generated by
the MMU

9. Will optimal page replacement algorithm suffer from Belady’s anomaly? Justify
your answer
In computer storage, Belady‘s anomaly is the phenomenon in which increasing the
number of page frames results in an increase in the number of page faults for certain
memory access patterns. This phenomenon is commonly experienced when using the
first-in first-out (FIFO) page replacement algorithm and not in optimal algorithm since
it follows stack property ie Last in first out (LIFO).

10. What are the consequences of multiprogramming with fixed partitioning and
variable partitioning?
Multi-programming with fixed partitioning is a contiguous memory management
technique in which the main memory is divided into fixed sized partitions which can
be of equal or unequal size. Due to which size of process is limited and main memory
is not utilized effectively.
Multi-programming with variable partitioning is a contiguous memory management
technique in which the main memory is not divided into partitions and the process is
allocated a chunk of free memory that is big enough for it to fit. Due to which there is
no limitation on size of process and main memory is utilized effectively.

UNIT IV – STORAGE MANAGEMENT

1. Distinguish file from dictionary.


A file is any kind of computer document whereas a directory is a collection of files and
folders.

2. List the various file attributes.


A file has certain other attributes, which vary from one operating system to another, but
typically consist of these: Name, identifier, type, location, size, protection, time, and
date and user identification

3. What are the functions of Virtual File System (VFS) layer in file system
implementation?

A virtual file system (VFS) or virtual file system switch is an abstraction layer on top of
a more concrete file system. The purpose of a VFS is to allow client applications to
access different types of concrete file systems in a uniform way. A VFS can, for
example, be used to access local and network storage devices transparently without the
client application noticing the difference.

4. How free-space is managed using bit vector implementation? List its advantages.

The free-space list is implemented as a bit map or bit vector. Each block is represented
by 1 bit. If the block is free, the bit is 1; if the block is allocated, the bit is 0.
Advantages: It is relatively simple and its efficiency in finding the first free block or n
consecutive free blocks on the disk.

5. What is HSM? Where it is used?


Hierarchical storage management (HSM) is a data storage technique, which
automatically moves data between high-cost and low-cost storage media.
HSM systems exist because high- speed storage devices, such as solid state drive
arrays, are more expensive (per byte stored) than slower devices, such as hard disk
drives, optical discs and magnetic tape drives.
6. How does DMA increase system concurrency?

DMA increases system concurrency by allowing the CPU to perform tasks while the
DMA system transfers data via the system and memory buses.

7. Define Seek time and Rotational Latency.

The time taken by the head to move to the appropriate cylinder or track is called seek
time

Rotational latency is the additional time waiting for the disk to rotate the desired sector
to the disk head.
8. What are the various file operations?
The six basic file operations are
Creating a file
Writing a file
Reading a file

Repositioning within a file


Deleting a file
Truncating a file

9. Write short notes on File mounting

• The basic idea behind mounting file systems is to combine multiple file systems into
one large tree structure.

• The mount command is given a file system to mount and a mount point (directory) on
which to attach it.

• Once a file system is mounted onto a mount point, any further references to that
directory actually refer to the root of the mounted file system.

10. What are the types of Path Names?


Path names can be of two types.

Absolute path name: Begins at the root and follows a path down to the specified file,
giving the directory names on the path.
Relative path name: Defines a path from the current directory

UNIT V – VIRTUAL MACHINES


1. What is iOS SDK?

The iOS Software Development Kit (SDK) contains the tools and interfaces needed to
develop, install, run, and test native apps that appear on an iOS device's Home screen.
2. What is Android?
Android is a as smartphones and tablet computers. The hardware that supports Android
software is based on the ARM architecture platform. Android is an open-source Linux-
based operating system. It is designed primarily for touchscreen mobile devices such
operating system means that it is free and anyone can use it.

3. List the framework used in the core OS layer.

Frameworks are accelerated framework, core Bluetooth framework, external accessory


framework, generic security services framework, security framework, system, and 64-bit
support.

4. List out the benefits of Virtualization


a. Better utilization of computer hardware.
b. More securable and manageable than one kernel running many applications.
c. Reduce complexity of hardware.
d. Consumes less power and less space.
e. Requires less maintenance
f. Extended life for installed software.

5. What is Live Migration in Virtualization?


Live migration refers to the process of moving a virtual machine (VM) running on one
physical host to another host without disrupting normal operations or causing any
downtime or other adverse effects for the end user. Live migration is considered a major
step in virtualization.

6. Explain the guest operating system.

A guest OS is software installed on either a virtual machine (VM) or partitioned disk that
describes an operating system that is different than the host operating system.
7. What is virtualization? ?
Virtualization is the creation of a virtual -- rather than actual -- version of
something, such as an operating system, a server, a storage device or
network resources
8. Define XEN.
Xen is a virtual machine monitor (VMM) for x86-compatible computers.
Xen can securely execute multiple virtual Machines, each running its OS, on
a single physical system with close-to-native performance. Xen is open
source and is released under terms of the GNU General Public License.

9. List the two types of Hypervisor.


There are two types of hypervisors: Type 1 and Type 2. Type 1 hypervisors
run directly on the system hardware. They are often referred to as "native"
"bare metal" or "embedded" hypervisors in vendor literature—type 2
hypervisors run on a host operating system.

10. What does Media Layer mean?

Media layer is an Apple Inc. term that refers to software frameworks


and technologies that enable audio, visual, and other multimedia
capabilities within an iOS- powered device. It defines the entire multimedia
architecture within Apple-powered mobile devices and applications.

You might also like