|| NOTICE BOARD ||

* * * THIS BLOG CAN BE BEST VIEWED ON GOOGLE CHROME * * * Quitters never win Winners never quit * * *

Sunday, June 7, 2009

PGDCA (Ist Semester) Examination, 2008-09 System Software Paper IV

PGDCA (Ist Semester)
Examination, 2008-09
System Software
Paper IV

Note : Attempt any 5 questions. Each question carries equal marks.

1 (a) Explain different types of operating systems. (7)
(b) What are the main difference between operating systems for mainframe computers and PCs? (3)

2.(a) What is the purpose of system calls? Explain. (5)
(b) What is the main difference between : (5)
(i) WAN & LAN
(ii) Trap & Interrupt

3.(a) What are the five major activities of an operating system with regard to process management? (5)
(b) Describe the difference between short term, medium term and long term scheduling. (5)

4.(a) What resources are used when thread is created? How do they differ from those used when a process is created? (6)
(b) What is meaning of term "Busy waiting"? What other kinds of waiting are there in an operating system? (4)

5. Consider the following set of processes, with the length of the CPU-burst time given in milliseconds. (10)

Process

CPU- Burst Time

Priority

p1

10

3

p2

1

1

p3

2

3

p4

1

4

p5

5

2

The processes are assumed to have arrived in the order p1,p2,p3,p4,p5 all at time 0.
(i) Average waiting time using FCFS, SJF (premptive and nonpremptive) scheduling mechanism.
(ii) Average turn around time using FCFS, SJF (premptive and non-premptive) and priority (premptive and non premptive) scheduling mechanism.

6.(a) Define compiler. Explain various phases of compilation process. (5)
(b) Given memory partition of 100 KB, 500 KB, 200 KB, 300KB, 600KB (in order), how would each of the first fit, best fit and worst fit algorithm place process of 212 KB, 417KB, 112KB and 426KB (in order). Which algorith makes the most efficient use of memory? (5)

7.(a) What are the various goals of protection? How system can bemade secure from threats? (5)
(b) What is the cause of thrashing? How does the system detect thrashing? Once it detect thrashing, what can the system do to eliminate this problem? (5)

8. Write short notes on any two of the following : (10)
(a) Encryption
(b) Virtual Memory
(c) Paging
(d) Linkers and Loaders

0 Comments:

इस ब्लाग की सामग्री को यथाशुद्ध प्रस्तुत करने का प्रयास किया गया है फिर भी किसी भी त्रुटि के लिए प्रकाशक जिम्मेदार नहीं होगा