Question Bank: Ii Year A & B
Question Bank: Ii Year A & B
Question Bank
II YEAR A & B
CS8493 OPERATING SYSTEMS
LTPC 3003
OBJECTIVES:
TOTAL : 45 PERIODS
TEXT BOOK :
1. Abraham Silberschatz, Peter Baer Galvin and Greg Gagne, ―Operating System
Concepts‖, 9th Edition, John Wiley and Sons Inc., 2012.
INDEX
UNIT NO TEXT/ REFERENCE BOOK PAGE
NO
UNIT -I Abraham Silberschatz, Peter Baer Galvin and Greg Gagne,
―Operating System Concepts‖, 9th Edition, John Wiley and 4-98
Sons Inc., 2012.
UNIT -II Abraham Silberschatz, Peter Baer Galvin and Greg Gagne,
―Operating System Concepts‖, 9th Edition, John Wiley and 103-422
Sons Inc., 2012.
UNIT -III Abraham Silberschatz, Peter Baer Galvin and Greg Gagne,
―Operating System Concepts‖, 9th Edition, John Wiley and Sons 455-572
Inc., 2012.
UNIT -IV Abraham Silberschatz, Peter Baer Galvin and Greg Gagne,
―Operating System Concepts‖, 9th Edition, John Wiley and Sons 575-688
Inc., 2012.
UNIT -V Abraham Silberschatz, Peter Baer Galvin and Greg Gagne,
―Operating System Concepts‖, 9th Edition, John Wiley and 695-795
Sons Inc., 2012.
UNIT I
OPERATING SYSTEMS OVERVIEW
Computer System Overview-Basic Elements, Instruction Execution, Interrupts, Memory Hierarchy, Cache
Memory, Direct Memory Access, Multiprocessor and Multicore Organization. Operating system overview-
objectives and functions, Evolution of Operating System.- Computer System Organization-Operating
System Structure and Operations- System Calls,
System Programs, OS Generation and System Boot.
PART A
S.
Question
No.
1 What are the objectives of operating system? (AU: April/May 2010) (AU: May/June
2012)
(April/May 2017)
Ans: An operating system is a program that manages the computer hardware. it act as an
intermediate between a users of a computer and the computer hardware. It controls and
coordinates the use of the hardware among the various application programs for the various
users.
2 What are the advantages of peer-to-peer systems over client-server systems?
(May/June 2016)
Ans:
• The main advantage of peer to peer network is that it is easier to set up
• In peer-to-peer networks all nodes are act as server as well as client therefore no need
of dedicated server.
• The peer to peer network is less expensive.
• Peer to peer network is easier to set up and use this means that you can spend less
time in the configuration and implementation of peer to peer network.
It is not require for the peer to peer network to use the dedicated server computer.
Any
computer on the network can function as both a network server and a user workstation
3 What is the purpose of system programs/system calls?(May/June 2016) (Apr/May
2018)
Ans: System programs can be thought of as bundles of useful system calls. They
provide basic functionality to users so that users do not need to
write their own programs to solve common problems.
An interrupt can be used to signal the completion of I/O so that the CPU doesn't have to
spend cycles polling the device. A trap can be used to catch arithmetic errors or to call
system routines
5 What are disadvantages of multi-processor systems?(Nov/Dec 2016)
Ans:
• Complex Operating System is required
• Large main memory required
• Very expensive
6 Defend timesharing differ from multiprogramming? If so, how?
(April/May 2015)
Ans: Main difference between multiprogramming and time sharing is that
multiprogramming is the effective utilization of CPU time, by allowing several programs to
use the CPU at the same time but time sharing is the sharing of a computing facility by
several users that want to use the same facility at the same time.
7 Why API’s need to be used rather than system call? (April/May2015)
Ans: There are four basic reasons:
1) System calls differ from platform to platform. By using a stable API, it is easier to migrate
your software to different platforms.
2) The operating system may provide newer versions of a system call with enhanced
features. The API implementation will typically also be upgraded to provide this support, so if
you call the API, you'll get it.
The API usually provides more useful functionality than the system call directly. If you
make the system call directly, you'll typically have to replicate the pre-call and post-call code
that's already implemented by the API. (For example the 'fork' API includes tons of code
beyond just making the 'fork' system call. So does 'select'.)
4) The API can support multiple versions of the operating system and detect which version it
needs to use at run time. If you call the system directly, you either need to replicate this code or
you can only support limited versions.
8 Compare and contrast DMA and cache memory.(Nov/Dec 2015)
Ans: DMA(Direct Memory Access): Direct memory access (DMA) is a feature of computer
systems that allows certain hardware subsystems to access main memory (Random-access
memory), independent of the central processing unit (CPU).
Cache Memory: A cache is a smaller, faster memory, closer to a processor core, which stores
copies of the data from frequently used main memory locations.
So, both DMA and cache are used for increasing the speed of memory access.
user interaction is
there won’t be any
involved in the
user interactions
processing
16 What is scheduler?
Ans: A process migrates between the various scheduling queues through out its life time.
The OS must select processes from these queues in some fashion. This selection process
is carried out by a scheduler.
17 What are the use of job queues, ready queues and device queues?
Ans: As a process enters a system they are put in to a job queue. This queues consist of
all jobs in the system. The processes that are residing in main memory and are ready and
waiting to execute are kept on a list called ready queue. The list of processes waiting for
particular I/O devices kept in the device queue.
Increased throughput.
Economy of scale.
Increased reliability.
Hardware interrupts
Software interrupts
27 Identify what virtual machine is and what are the advantages virtual machines.
Ans: Virtual Machine is a completely separate individual operating system installation on
your usual operating system. It is implemented by software emulation and hardware
virtualization.
Advantages:
28 Distinguish between hard real time systems and soft real time systems.
Ans:
A Hard Real-Time System guarantees that critical tasks complete on time.
A Soft Real Time System where a critical real-time task gets priority over other
tasks and retains that priority until it completes.
29
Summarize the functions of DMA.
Ans: Direct memory access (DMA) is a method that allows an input/output
(I/O) device to send or receive data directly to or from the main memory,
bypassing the CPU to speed up memory operations. The process is managed by
a chip known as a DMA controller (DMAC).
32
Some computer systems do not provide a privileged mode of operation in
hardware. Is it possible to construct a secure operating system for these
computer systems? (Nov/Dec 2018)
Ans: An operating system for a machine of this type would need to remain
in control (or monitor mode) at all times. This could be accomplished by two
methods:
a. Software interpretation of all user programs (like some BASIC, Java, and
LISP systems, for example). The software interpreter would provide, in
software, what the hardware does not provide.
36 What are the five major activities of an operating system with regard to
process management?
37 What are the three major activities of an operating system with regard to
memory management?
a. Keep track of which parts of memory are currently being used and by
whom.
b. Decide which processes are to be loaded into memory when memory space
becomes available.
38 What are the three major activities of an operating system with regard to
secondary- storage management?
Ans:The three major activities are:
• Free-space management.
• Storage allocation.
• Disk scheduling
39 What is an Operating system?
Error detection
Ans:A more common definition is that the OS is the one program running at all
times on the computer, usually called the kernel, with all else being application
programs.
Ans:Increased throughput
Economy of scale
Increased reliability
Ans:
Process Control
File-management
Device-management
Information maintenance
Communications
Ans:
User Mode
Monitor Mode
Ans:Operators batched together jobs with similar needs and ran through the
computer as a group .The operators would sort programs into batches with
similar requirements and as system become available, it would run each batch.
Ans:
Application Program
System Program
Operating System
Computer Hardware
PART B & C
Priority inversion occurs when task interdependency exists among tasks with
different priorities.
I/O bound process, spends majority of its time in input/output related operations.
4 What resources are required to Creating
threads? (Nov/Dec 2016)
Ans: When a thread is Creatingd the threads does
not require any new resources to execute. The thread
shares the resources of the process to which it
belongs to and it requires a small data structure to
hold a register set, stack, and priority.
boolean rv = target;
target = true;
return rv;
• Swap
boolean temp = a;
a = b;
b = temp;
}
25 What is a semaphore?
Ans: A semaphore 'S' is a synchronization tool
which is an integer value that, apart from
initialization, is accessed only through two standard
atomic operations; wait and signal .Semaphores can
be used to deal with the n-process critical section
problem. It can be also used to solve various
Synchronization problems.
26 Define Deadlock.
Ans: A process requests resources; if the resources
are not available at that time, the process enters a
wait state. Waiting processes may never again
change state, because the resources they have
requested are held by other waiting processes. This
situation is called a deadlock.
27 List two programming examples of
multithreading giving improved performance
over a single-threaded solution.
Ans:
• A Web server that services each request in a
separate thread.
• A parallelized application such as matrix
multiplication where different parts of the
matrix may be worked on in parallel.
• An interactive GUI program such as a
debugger where a thread is used to monitor
user input, another thread represents the
running application, and a third thread
monitors performance.
28 What are the conditions under which a deadlock
situation may arise?
Ans: A deadlock situation can arise if the following
four conditions hold simultaneously in a system:
• Mutual exclusion
• Hold and wait
• No pre-emption
• Circular wait
39 Define schedulers?
Problem
resource
45 Give the condition necessary for a deadlock
situation to arise?
Mutual Exclusion
No preemption
Circular Wait
PART B&C
1 Suppose that the following processes arrive for
execution at the times indicated. Each process will
run the listed amount of time. In answering the
questions, use non-preemptive scheduling and
base all decisions on the information you have at
the time the decision must be made. (Nov/Dec
2018)
Process Arrival Time Burst Time
P1 0.0 8
P2 0.4 4
P3 1.0 1
UNIT III
STORAGE MANAGEMENT
PART A
S. Question
No.
Logical Physical
1. An address seen by
memory unit that is, the one
loaded into the memory
address register of the
1. An address generated memory is referred to as
by CPU is referred to us a physical address.
logical address.
1. When the user is paying for management costs, and the costs
are cheaper for a time-sharing system than for a single-user
computer.
Ans:
Ans:
Ans:
When the allocated memory may be slightly larger than the
requested memory, the difference between these two numbers is
internal fragmentation.
Ans:
Compaction is a solution to external fragmentation. The
memory contents are shuffled to place all free memory together
in one large block. It is possible only i f relocation is dynamic,
and is done at execution time.
Ans:
Paging is a memory management scheme that permits the
physical -address space of a process to be non-contiguous. In
the case of paging, physical memory is broken into fixed-sized
blocks called frames and logical memory is broken into blocks
of the same size called pages.
Ans:
When the bit is set to valid, this value indicates that the
associated page is in the process’s logical address space, and is
thus a legal page. If the bit is said to invalid, this value indicates
that the page is not in the process’s logical address space. Using
the valid-invalid bit traps illegal addresses.
Ans:
All addresses need to be adjusted upward by 250.So the
adjusted addresses would be 300, 328, 400, 402, and 40
Ans:
When starting execution of a process with no pages in memory,
the operating system sets the instruction pointer to the first
instruction of the process, which is on a non-memory resident
page, the process immediately faults for the page. After this
page is brought into memory, the process continues to execute,
faulting as necessary until every page that it needs is in memory.
At that point, it can execute with no more faults. This schema is
pure demand paging.
43 What is a Reference
String? Ans:
An algorithm is evaluated by running it on a particular string of
memory references and computing the number of page faults.
The string of memory reference is called a reference string
Ans:
This memory holds those pages that are not present in main
memory. The secondary memory is usually a high speed disk. It
is known as the swap device, and the section of the disk used for
this purpose is known as swap space.
45 What is the basic approach of Page Replacement?
Ans:
If no frame is free is available, find one that is not currently
being used and free it. A frame can be freed by writing its
contents to swap space, and changing the page table to indicate
that the page is no longer in memory. Now the freed frame can
be used to hold the page for which the process faulted.
Ans:
FIFO page replacement
Ans:
Best fit allocates the smallest hole that is big enough. The entire
list has to be searched, unless it is sorted by size. This strategy
produces the smallest leftover hole.
Ans:
First fit allocates the first hole that is big enough. Searching can
either start at the beginning of the set of holes or where the
previous first-fit search ended. Searching can be stopped as soon
as a free hole that is big enough is found.
Ans:
A logical address does not refer to an actual existing address;
rather, it refers to an abstract address in an abstract address
space. Contrast this with a physical address that refers to an
actual physical address in memory. A logical address is
generated by the CPU and is translated into a physical address
by the memory management unit(MMU). Therefore, physical
addresses are generated by the MMU.
address? Ans:
PART B&C
1 Explain about given memory management techniques. (i)
Partitioned allocation (ii) Paging and translation look-aside
buffer. (Nov/Dec 2015) (Apr/May 2017)
Refer page no 360-371 from text book “Abraham Silberschatz,
Peter Baer Galvin and Greg Gagne, “Operating System
Concepts”, 9th Edition, John Wiley and Sons Inc., 2012”.
2 Elaborate about the free space management on I/O buffering
and blocking. (Apr/May 2017)
Refer page no 561 – 564 from text book “Abraham Silberschatz,
Peter Baer Galvin and Greg Gagne, “Operating System
Concepts”, 9th Edition, John Wiley and Sons Inc., 2012”.
3 What is copy-on write feature and under what circumstances it
is beneficial? What hardware support is needed to implement
this feature? (Nov/Dec 2016)
Refer page no 400-401 from text book “Abraham Silberschatz,
Peter Baer Galvin and Greg Gagne, “Operating System
Concepts”, 9th Edition, John Wiley and Sons Inc., 2012”.
4 When page faults will occur? Describe the actions taken by
operating system during page fault. (May/June 2016)
Refer page no 360-371 from text book “Abraham Silberschatz,
Peter Baer Galvin and Greg Gagne, “Operating System
Concepts”, 9th Edition, John Wiley and Sons Inc., 2012”.
5
Consider the following page reference string: 1, 2, 3, 4, 2, 1, 5,
6, 2, 1, 2, 3, 7, 6, 3, 2, 1, 2, 3, 6.
Identify the no.of page faults would occur for the following
replacement algorithms, assuming one, two, three, four, five,
six, or seven frames? Remember all frames are initially empty,
so your first unique pages will all cost one fault each.
a.LRU replacement b. FIFO replacement
c.Optimal replacement (Apr/May 2015) (Nov/Dec2015)
--Refer class work
6 Explain about the difference between internal fragmentation and
external fragmentation. (Nov/Dec2016)
Refer page no 354-358 from text book “Abraham Silberschatz,
Peter Baer Galvin and Greg Gagne, “Operating System
Concepts”, 9th Edition, John Wiley and Sons Inc., 2012”.
7 Why are segmentation and paging sometimes combined into
one scheme? (May/June 2016)
Refer page no 358-360 from text book “Abraham Silberschatz,
Peter Baer Galvin and Greg Gagne, “Operating System
Concepts”, 9th Edition, John Wiley and Sons Inc., 2012”.
8 Explain why sharing a reentrant module is easier when
segmentation is used than when pure paging is used with
example. (Apr/May 2018)
9 Discuss situation under which the most frequently used page
replacement algorithm generates fewer page faults than the
least frequently used page replacement algorithm. Also dicuss
under which circumstances the opposite holds. (Apr/May 2018)
10 Compare paging with segmentation in terms of the amount of
memory required by the address translation structures in order
to convert virtual addresses to physical addresses. (Nov/Dec
2018)
11 Most systems allow programs to allocate more memory to its
address space during execution. Data allocated in the heap
segments of programs is an example of such allocated memory.
What is required to support dynamic memory allocation in the
following schemes? (Nov/Dec 2018)
i) Contiguous memory allocation ii)Pure segmentation iii) Pure
paging
UNIT IV
I/O SYSTEMS
Mass Storage Structure- Overview, Disk Scheduling and Management; File System Storage-
File Concepts, Directory and Disk Structure, Sharing and Protection; File System
Implementation- File System Structure, Directory Structure, Allocation Methods, Free Space
Management; I/O Systems.
PART A
S.
No Question
.
1 Distinguish file from dictionary. (Apr/May2017)
Ans:
A file is any kind of computer document whereas a directory is a
collection of files and folders.
2 Why it is important to scale up system bus and device speed
as CPU speed increases? (Nov/Dec 2016)
Ans:
Consider a system which performs 50% I/O and 50% computes.
Doubling the CPU performance on this system would increase
total system performance by only 50%. Doubling both system
aspects would increase performance by 100%. Generally, it is
important to remove the current system bottleneck, and to
increase overall system performance, rather than blindly
increasing the performance of individual system components.
Ans:
Most disks do not export their rotational position information to
the host. Even if they did, the time for this information to reach
the scheduler would be subject to imprecision and the time
consumed by the scheduler is variable, so the rotational position
information would become incorrect. Further, the disk requests
are usually given in terms of logical block numbers, and the
mapping between logical blocks and physical locations is very
complex.
6 List the various file attributes. (Apr/May 2015) (Nov/Dec
2018)
Ans:
A file has certain other attributes, which vary from one operating
system to another, but typically consist of these: Name,
identifier, type, location, size, protection, time, and date and user
identification
Access rights
12 What are the different accessing methods of a file?
Ans:
The different types of accessing a file are:
Sequential access: Information in the file is accessed
sequentially
Direct access: Information in the file can be accessed without
any particular order.
Other access methods: Creating index for the file, indexed
sequential access method (ISAM) etc.
13 Define Directory.
Ans:
The device directory or simply known as directory records
information-such as name, location, size, and type for all files on
that particular partition. The directory can be viewed as a symbol
table that translates file names into their directory entries.
14 List the operations that can be performed on a directory.
Ans:
Users are isolated from each other. Users have more freedom in
choosing file names.
21 List the disadvantages of two-level directory?
Ans:
Without other provisions, two users who want to cooperate with
each other are hampered in reaching each other‘s files, and
system files are inaccessible.
22 Discover the ways to overcome the disadvantages of two-
level directory?
Ans:
Provide links from one user directory to another, creating path
names; system files become available by letting the command
interpreter search your directory first, and then the system
directory if file needed is not in first directory.
23 What are the allocation methods of a disk
space? Ans:
Methods of allocating disk space which are widely in use are
a. Contiguous allocation
b. Linked allocation
c. Indexed allocation
24 List various layers of a file
system. Ans:
The file system is composed of many different levels. Each level
in the design uses the feature of the lower levels to Creating new
features for use by higher levels.
Application programs
Logical file system
File-organization module
Basic file system
I/O control
Devices
28 Define Spooling.
Ans:
A spool is a buffer that holds output for a device, such as printer,
that cannot accept interleaved data streams. When an application
finishes printing, the spooling system queues the corresponding
spool file for output to the printer. The spooling system copies
the queued spool files to the printer one at a time.
29 What are the various disk-scheduling algorithms?
Ans:
The various disk-scheduling algorithms are
• First Come First Served Scheduling
• Shortest Seek Time First Scheduling
• SCAN Scheduling
• C-SCAN Scheduling
LOOK scheduling
30 What is the use of boot
block? Ans:
For a computer to start running when powered up or rebooted it
needs to have an initial program to run. This bootstrap program
tends to be simple. It finds the operating system on the disk
loads that kernel into memory and jumps to an initial address to
begin the operating system execution. The full bootstrap
program is stored in a partition called the boot blocks, at fixed
location on the disk. A disk that has boot partition is called boot
disk or system disk.
31 List three ways of allocating storage, and give advantages of
each.
Ans:
a. Contiguous allocation. Fastest, if no changes are to be made.
Also easiest for random access files.
b. Linked allocation. No external fragmentation. File can grow
without complications.
c. Indexed allocation. Supports direct access without external
fragmentation.
Ans:
Ans:
Ans:
The way to split „m’ frames among „n’ processes is to give
everyone an equal share, m/n frames. For instance, if there are
93 frames and 5 processes, each process will get 18 frames. The
leftover 3 frames could be used as a free-frame buffer pool. This
scheme is called equal allocation.
Ans:
Thrashing is caused by under allocation of the minimum number
of pages required by a process, forcing it to continuously page
fault. The system can detect thrashing by evaluating the level of
CPU utilization as compared to the level of multiprogramming.
It can be eliminated by reducing the level of multiprogramming.
Ans:
Effective access time = (1-p) *ma + p*page fault time
= (1-p) *100+p*25000000
= 100-100p+25000000*p
= 100 + 24999900p
Ans:
For some page replacement algorithms, the page fault rate may
increase as the number of allocated frames increases
40 What are the types of Path Names?
Ans:
Path names can be of two types.
Absolute path name: Begins at the root and follows a path down
to the specified file, giving the directory names on the path.
Reference? Ans:
The locality model states that, as a process executes, it moves
from locality to locality. Locality is of two types.
Spatial locality
Temporal locality.
Ans:
The advantages are,
Supports direct access
Ans:
The disadvantages are,
Ans:
The advantages are,
No external fragmentation
Ans:
The disadvantages are,
Algorithms? Ans:
C-SCAN Scheduling
LOOK scheduling
I/O. Ans:
Programmed I/O
Ans:
Sequentially - Print the content of the file.
Ans:
There would be multiple paths to the same file, which could
confuse users or encourage mistakes. (Deleting a file with one
path deletes the file in all the other).
50 Why must the bit map for file allocation be kept on mass
storage rather than in main memory?
Ans:
In case of system crash (memory failure ), the free-space list
would not be lost as it would be if the bit map had been stored in
main memory
PART B
1 Explain about directory structure? (Apr/May 2015) (Apr/May
2017)
Refer page no 517 – 526 from text book “Abraham Silberschatz,
Peter Baer Galvin and Greg Gagne, “Operating System
Concepts”, 9th Edition, John Wiley and Sons Inc., 2012”.
2 What are files and explain the access methods for files?
(Apr/May 2017)
Refer page no 379 – 382 from text book “Abraham Silberschatz,
Peter Baer Galvin and Greg Gagne, “Operating System
Concepts”, 9th Edition, John Wiley and Sons Inc., 2012”.
3 Explain about kernel I/O subsystem and transforming I/O to
hardware operations. (Apr/May 2017)
Refer page no 592-600 from text book “Abraham
Silberschatz, Peter Baer Galvin and Greg Gagne, “Operating
System Concepts”, 9th Edition, John Wiley and Sons Inc.,
2012”.
9
Distinguish between a STREAMS driver and STREAMS
module. (Nov/Dec 2016)
Refer page no 601-602 from text book “Abraham
Silberschatz, Peter Baer Galvin and Greg Gagne, “Operating
System Concepts”, 9th Edition, John Wiley and Sons Inc.,
2012”.
10 What are the various disk space allocation methods. Explain in
detail. (Apr/May 2018)
11 Consider a file system where a file can be deleted and the disk
space reclaimed while the links to that file still exist. What
problems may occur if a new file is created in the same storage
area or with the same absolute path name? How these problem
be avoided? (Nov/Dec 2015)
12 Illustrate an application that could benefit from operating system
support for random access to indexed files. (Nov/Dec 2015)
UNIT V
CASE STUDY
PART A
S. Question
No.
13 Define: Conflict
Resolution. Ans:
A mechanism that allows different device drivers to, reserve
hardware resources and to protect those resources from
accidental use by another driver.
Linux provides a ventral conflict resolution mechanism.
18 Define XEN.
Ans:
Xen is a virtual machine monitor (VMM) for x86-compatible
computers. Xen can securely execute multiple virtual machines,
each running its own OS, on a single physical system with close-
to-native performance. Xen is open source, and is released under
terms of the GNU General Public License.
19 List the advantages of Virtualization.
Ans:
• Better utilization of computer hardware.
• More securable and manageable than one kernel running
many applications.
• Reduce complexity of hardware.
• Consumes less power and less space.
• Requires less maintenance
Extended life for installed software.
20 Illustrate the key features of VMware server virtualization.
Ans:
• High Availability (HA)
• Fault Tolerance (FT)
• vMotion
• Storage vMotion
• Distributed Resource Scheduler (DRS)
21 Explain guest operating system.
Ans: A guest OS is the software installed on either a virtual
machine (VM) or partitioned disk that describes an operating
system that is different than the host operating system.
22 Summarize the three layers network in LINUX
kernel. Ans:
• L2 corresponds to Datalink Layer of OSI
• L3 corresponds to Network Layer of OSI
• L4 corresponds to Transport Layer of OSI
23 Define demand-zero memory.
Ans: "Demand zero" memory is a sections of memory that exist
only as virtual memory, without existing anywhere as physical
memory nor backed anywhere on disk.
Ans:
Linux virtualization refers to running one or more virtual
machines on a physical computer that's operated by the Linux
open source operating system. Linux virtualization can be used
for isolating specific apps, programming code or even an
operating system itself, as well as for security and performance
testing purposes.
27 Prepare a list of LINUX system administrator
responsibilities.
Ans:
The Linux system administrators are responsible for installing,
configuring and maintaining the Linux servers and workstations.
They are responsible for maintaining the network environment
as well as the health of the network and servers.
32
What is handle? How does a process obtain a handle?
(Apr/May 2018)
Ans: A handle is an abstract reference to a resources.
A process gets a handle by creating an object, by opening an
existing object, by receiving a duplicated handle from another
process, or by inhering a handle from the parent process. When a
process exists, all its open handles are implicitly closed.
33 What is meant by Data Striping?
Ans:
Disk? Ans:
System? Ans:
Linux System composed of three main modules. They are:
modules? Ans:
The Module support under Linux has three components. They
are:
(ii).Driver Registration.
37 What is meant by
Process? Ans:
Ans:
Each process has a unique identifier. PID’s are used to specify
processes to the operating system when an application makes a
system call to signal, modify or wait for another process.
39 What is meant by Personality?
Ans:
Process Personalities are primarily used by emulation libraries to
request that system call be compatible with certain versions of
UNIX.
Ans:
It is the kernel's main cache for block-oriented devices such as
disk drives and is the main mechanism through which I/O to
these devices is performed.
system? Ans:
Kernel is responsible for maintaining all the important
abstractions of the operating system including such things as
virtual memory and processes.
Ans:
System Libraries define a standard set of functions through
which applications can interact with the kernel and that
implement much of the operating -system functionality that
doesn’t need the full privileges of kernel code.
Ans:
System Utilities are system programs that perform individual,
specialized management tasks. Some of the System utilities may
be invoked just to initialize and configure some aspect of the
system and others may run permanently, handling such tasks as
responding to incoming network connections, accepting logon
requests from terminals or updating log files.
management? Ans:
The module management allows modules to be loaded into
memory and to talk to the rest of the kernel.
Ans:
Driver Registration allows modules to tell the rest of the kernel
that a new driver has become available
mechanism? Ans:
This mechanism allows different device drivers to reserve
hardware resources and to protect those resources from
accidental use by another driver.
Ans:
Device drivers include (i) Character devices such as printers,
terminals (ii) Block devices including all disk drives) and
network interface devices.
Ans:
Media layer is an Apple Inc. term that refers to software
frameworks and technologies that enable audio, visual and other
multimedia capabilities within an iOS powered device. It defines
the entire multimedia architecture within Apple-powered mobile
devices and applications.
50 Define Services
Layer. Ans:
Service layer is the middle layer between presentation and data
store. It abstracts business logic and data access. The idea behind
such a layer is to have an architecture which can support
multiple presentation layers such as web, mobile, etc.
PART B&C
1 Explain about Linux kernel and virtualization with neat sketch.
(Apr/May 2017) (Nov/Dec 2016)
Refer page no 703 – 705 from text book “Abraham Silberschatz,
Peter Baer Galvin and Greg Gagne, “Operating System
Concepts”, 9th Edition, John Wiley and Sons Inc., 2012”.
2 Explain the step-by-step procedure for setting up a local network
services. (Nov/Dec 2016)
Refer: https://www.ibm.com/developerworks/library/l-
lan/index.html