De8aa W 15 Osy 17512
De8aa W 15 Osy 17512
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER – 15 EXAMINATION
Marks
1. (A) Attempt any THREE of the following: 12
a) List different types of operating systems. Explain advantages of multiprocessor system (any
two)
(List any four types – ½ Mark each, any two relevant Advantages - 1 Mark each)
Ans:
Different types of operating systems:
• Mainframe systems
• Multiprocessor systems
• Clustered systems
• Distributed systems
• Real time systems
Advantages of multiprocessor system:
• Less time duration required for the large process.
• Increase throughput.
• Economy of scale.
• Increased reliability.
Page 1 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER – 15 EXAMINATION
Ans:
In multiprogramming, more than one program lies in the memory i.e. in terms of Operating
system, the scheduler selects the jobs to be placed in ready queue from a number of programs.
The ready queue is placed in memory and the existence of more than one program in main
memory is known as multiprogramming.
Since there is only once processor, there can be no simultaneous execution of different programs.
Instead the operating system executes part of one program, then the part of another and so on.
Multiprogramming is the simple form of parallel processing in which several programs run at the
same time on a processor.
OR
Example of multiprogramming, we open word, excel, access and other applications together but
while we type in word other applications such as excel and access are just present in main
memory but they are not performing any task or work. Or we can say that are not being
Page 2 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER – 15 EXAMINATION
Ans:
Monolithic Systems:
The structure is that there is no structure. The operating system is written as a collection of
procedures, each of which can call any of the other ones whenever it needs to. When this
technique is used, each procedure in the system has a well-defined interface in terms of
parameters and results, and each one is free to call any other one, if the latter provides some
useful computation that the former needs.
For constructing the actual object program of the operating system when this approach is used,
one compiles all the individual procedures, or files containing the procedures, and then binds
them all together into a single object file with the linker. In terms of information hiding, there is
essentially none- every procedure is visible to every other one i.e. opposed to a structure
containing modules or packages, in which much of the information is local to module, and only
officially designated entry points can be called from outside the module.
However, even in Monolithic systems, it is possible to have at least a little structure. The services
like system calls provide by the operating system are requested by putting the parameters in well-
defined places, such as in registers or on the stack, and then executing a special trap instruction
known as a kernel call or supervisor call.
Page 3 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER – 15 EXAMINATION
Page 4 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER – 15 EXAMINATION
(a) Explain any six services provided operating system. Draw diagram showing services.
(Explanation of six services – 3 Marks, any relevant Diagram - 3 Marks)
Ans:
1. User interface
2. Program execution
3. I/O operations
4. File-system manipulation
5. Communications
6. Error detection
7. Accounting
8. Resource allocation
9. protection and security
1. User interface: Almost all operating systems have a user interface (UI).The interface can take
several forms. One is a DTrace command-line interface(CLI),which uses text commands and
a method for entering them (say, a program to allow entering and editing of
commands).Another is a batch interface , in which commands and directives to control those
commands are entered into files, and those files are executed . Most commonly, a graphical
user interface (GUI) is used.
2. Program execution: The operating system loads the contents (or sections) of a file into
memory and begins its execution. A user-level program could not be trusted to properly
allocate CPU time.
3. I/O operations: Disks, tapes, serial lines, and other devices must be communicated with at a
very low level. The user need only specify the device and the operation to perform on it, while
the system converts that request into device- or controller-specific commands. User-level
programs cannot be trusted to access only devices they should have access to and to access
them only when they are otherwise unused.
4. File-system manipulation: There are many details in file creation, deletion, allocation, and
naming that users should not have to per-form. Blocks of disk space are used by files and
must be tracked. Deleting a file requires removing the name file information and freeing the
allocated blocks. Protections must also be checked to assure proper file access. User programs
could neither ensure adherence to protection methods nor be trusted to allocate only free
blocks and deallocate blocks on file deletion.
5. Communications: Message passing between systems requires messages to be turned into
packets of information, sent to the net-work controller, transmitted across a communications
medium, and reassembled by the destination system. Packet ordering and data correction must
Page 5 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER – 15 EXAMINATION
Page 6 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER – 15 EXAMINATION
Ans:
The contiguous allocation method requires each file to occupy a set of contiguous address on the
disk. Disk addresses define a linear ordering on the disk. Notice that, with this ordering, accessing
block b+1 after block b normally requires no head movement. When head movement is needed
(from the last sector of one cylinder to the first sector of the next cylinder), it is only one track.
Thus, the number of disk seeks required for accessing contiguous allocated files in minimal, as is
seek time when a seek is finally needed. Contiguous allocation of a file is defined by the disk
address and the length of the first block. If the file is n blocks long, and starts at location b, then it
occupies blocks b, b+1, b+2, …, b+n-1. The directory entry for each file indicates the address of
the starting block and the length of the area allocated for this file.
The difficulty with contiguous allocation is finding space for a new file. If the file to be created is
n blocks long, then the OS must search for n free contiguous blocks. First-fit, best-fit, and worst-
fit strategies (as discussed in Chapter 4 on multiple partition allocation) are the most common
strategies used to select a free hole from the set of available holes. Simulations have shown that
both first-fit and best-fit are better than worst-fit in terms of both time storage utilization.
Neither first-fit nor best-fit is clearly best in terms of storage utilization, but first-fit is generally
faster.
These algorithms also suffer from external fragmentation. As files are allocated and deleted, the
free disk space is broken into little pieces. External fragmentation exists when enough total disk
Page 7 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER – 15 EXAMINATION
Ans:
Clustered System: Cluster is a group of interconnected, whole computers working together as a
unified computing source that can create the illusion of being one machine. Each computer in a
cluster is typically referred to as a node. Clustering (means gather together) allows two or more
system to share storage closely linked via a local area network. Asymmetric Cluster (at least two
servers: One is on a standby mode while the other is monitoring the other one. If one stops other
will work).Symmetric Cluster (all work at the same level: They work together and monitor each
other).
Page 8 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER – 15 EXAMINATION
Page 9 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER – 15 EXAMINATION
New: The process being created is available in the new state. It is the new state because the
system is not permitted it to enter the ready state due to limited memory available in the ready
queue. If some memory becomes available, then the process from the new state will go to ready
state.
Ready State: The process which is not waiting for any external event such as I/O operation and
which is not running is said to be in ready state. It is not in the running state because some other
process is already running. It is waiting for its turn to go to the running state.
Running State: The process which is currently running and has control of the CPU is known as
the process in running state. In single user system, there is only one process which is in the
running state. In multiuser system, there are multiple processes which are in the running state.
Blocked State: The process is currently waiting on external event such as an I/O operation is said
to be in blocked state. After the completion of I/O operation, the process from blocked state enters
in the ready state and from the ready state when the process turn will come it will again go to
running state.
Terminated / Halted State: The process whose operation is completed, it will go the terminated
state from the running state. In halted state, the memory occupied by the process is released.
Page 10 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER – 15 EXAMINATION
Example:
FCFS algorithm
SJF (Non preemptive)
Paging:
Paging refers to the transfer of memory pages from physical memory to disk and vice versa.
Virtual memory uses a technique called demand paging for its implementation.
Logical address space of a process can be noncontiguous; process is allocated physical memory
whenever the latter is available
Page 11 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER – 15 EXAMINATION
Page fault:
When the process executes and accessed the pages that are present into memory, execution
proceeds normally. But if the process tries to access a page which is marked invalid, then it causes
a page fault trap. This trap occurs because operating system has failed to bring the desired page
into memory. The main functions of paging are performed when a program tries to access pages
that do not currently reside in the RAM. This situation is known as page fault. The OS must take
control and handle the page fault.
The shell, which connects and interprets users' commands, calls programs from Memory, and
executes them.
The kernel is the heart of the system, a collection of programs written in C that directly
communicate with the hardware. There is only one kernel for any system. It's that part of UNIX
system that is loaded into memory when the system is booted. It manages the System resources,
allocates time between user and processes, decides process priorities, and performs all other tasks.
The kernel, in traditional parlance, is often called the Operating system. The shell, on the other
hand, is the "sleeping beauty" of UNIX. It is actually the interface between the user and the
kernel. The shell is the agency which takes care of the features of redirection and has a
programming capability of its own.The Tools and Applications consist of Application Software,
Compilers, Database Package, Internet tools, UNIX commands, etc.
Page 12 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER – 15 EXAMINATION
Page 13 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER – 15 EXAMINATION
The five major activities of an operating system in regard to process management are:
Page 14 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER – 15 EXAMINATION
Memory Management:
Main-Memory is a large array of words or bytes. Each word or byte has its own address. Main-
memory provides storage that can be access directly by the CPU. That is to say for a program to
be executed, it must in the main memory.
The major activities of an operating in regard to memory-management are:
Keep track of which part of memory are currently being used and by whom.
Decide which processes are loaded into memory when memory space becomes available.
Allocate memory space as needed
Deallocate memory space as needed
Ans:
Inter-process communication: Cooperating processes require an Inter- process communication
(IPC) mechanism that will allow them to exchange data and information.
Page 15 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER – 15 EXAMINATION
2. Message Passing
Page 16 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER – 15 EXAMINATION
Ans:
Banker’s Algorithm
This algorithm calculates resources allocated, required and available before allocating resources
to any process to avoid deadlock. It contains two matrices on a dynamic basis. Matrix A contains
resources allocated to different processes at a given time. Matrix B maintains the resources which
are still required by different processes at the same time.
Algorithm F: Free resources
Step 1: When a process requests for a resource, the OS allocates it on a trial basis.
Step 2: After trial allocation, the OS updates all the matrices and vectors. This updation can be
done by the OS in a separate work area in the memory.
Step 3: It compares F vector with each row of matrix B on a vector to vector basis.
Step 4: If F is smaller than each of the row in Matrix B i.e. even if all free resources are allocated
o any process in Matrix B and not a single process can completes its task then OS concludes that
the system is in unstable state.
Step 5: If F is greater than any row for a process in Matrix B the OS allocates all required
resources for that process on a trial basis. It assumes that after completion of process, it will
release all the recourses allocated to it. These resources can be added to the free vector.
Step 6: After execution of a process, it removes the row indicating executed process from both
matrices.
Step 7: This algorithm will repeat the procedure step 3 for each process from the matrices and
finds that all processes can complete execution without entering unsafe state. For each request for
any resource by a process OS goes through all these trials of imaginary allocation and updation.
After this if the system remains in the safe state, and then changes can be made in actual matrices.
Page 17 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER – 15 EXAMINATION
Page 18 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER – 15 EXAMINATION
2. Writing a file. To write a file, we make a system call specifying both the name of the file and
the information to be written to the file. The system must keep a write pointer to the location in
the file where the next write is to take place. The write pointer must be updated whenever a write
occurs.
3. Reading a file. To read from a file, we use a system call that specifies the name of the file and
where (in memory) the next block of the file should be put. The system needs to keep a read
pointer to the location in the file where the next read is to take place. Because a process is usually
either reading from or writing to a file, the current operation location can be kept as a per-process
current-file-position pointer. Both the read and write operations use this same pointer, saving
space and reducing system complexity.
4. Repositioning within a file. The directory is searched for the appropriate entry, and the
current-file-position pointer is repositioned to a given value. Repositioning within a file need not
involve any actual I/O. This file operation is also known as a file seek.
5. Deleting a file. To delete a file, we search the directory for the named file. Having found the
associated directory entry, we release all file space, so that it can be reused by other files, and
erase the directory entry.
The five operations described comprise only the minimal set of required file operations. More
commonly, we shall also want to edit the file and modify its contents. A special case of editing a
file is appending new information at the end of the file. Copies of the file can also be created, and
Page 19 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER – 15 EXAMINATION
6. Truncating a file. The user may want to erase the contents of a file but keep its attributes.
Rather than forcing the user to delete the file and then recreate it, this function allows all attributes
to remain unchanged (except for file length) but lets the file be reset to length zero and its file
space released.
Page 20 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER – 15 EXAMINATION
Page 21 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER – 15 EXAMINATION
User-Level Threads: -
A user-level thread is a thread within a process which the OS does not know about.
In a user-level thread approach the cost of a context switch between threads less since the
operating system itself does not need to be involved–no extra system calls are required.
A user-level thread is represented by a program counter; registers, stack, and small thread
control block (TCB).
Programmers typically use a thread library to simplify management of threads within a
process.
Creating a new thread, switching between threads, and synchronizing threads are done via
function calls into the library. This provides an interface for creating and stopping threads, as
well as control over how they are scheduled.
Kernel Threads: -
In systems that use kernel-level threads, the operating system itself is aware of each individual
thread.
Kernel threads are supported and managed directly by the operating system.
Page 22 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER – 15 EXAMINATION
(d) State and describe types of schedules. Describe how each of them schedule the job
(State types of scheduler - 1 Mark, Description of three types - 1 Mark each)
[**Note: - Any relevant description about schedules shall be considered]
Ans:
Schedulers are of three types:-
Long Term Scheduler
Short Term Scheduler
Medium Term Scheduler
It is also called CPU scheduler. Main objective is increasing system performance in accordance
with the chosen set of criteria. It is the change of ready state to running state of the process. CPU
scheduler selects process among the processes that are ready to execute and allocates CPU to one
of them.Short term scheduler also known as dispatcher, execute most frequently and makes the
fine grained decision of which process to execute next. Short term scheduler is faster than long
term scheduler.
Page 23 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER – 15 EXAMINATION
Medium term scheduling is part of the swapping. It removes the processes from the memory. It
reduces the degree of multiprogramming. The medium term scheduler is in-charge of handling the
swapped out-processes. Running process may become suspended if it makes an I/O request.
Suspended processes cannot make any progress towards completion. In this condition, to remove
the process from memory and make space for other process, the suspended process is moved to
the secondary storage. This process is called swapping, and the process is said to be swapped out
or rolled out. Swapping may be necessary to improve the process mix.
Page 24 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER – 15 EXAMINATION
During the lifespan of a process, its execution status may be in one of four states: (associated with
each state is usually a queue on which the process resides)
New: The process being created is available in the new state. It is the new state because the
system is not permitted it to enter the ready state due to limited memory available in the ready
queue. If some memory becomes available, then the process from the new state will go to ready
state.
Ready State: The process which is not waiting for any external event such as I/O operation and
which is not running is said to be in ready state. It is not in the running state because some other
process is already running. It is waiting for its turn to go to the running state.
Running State: The process which is currently running and has control of the CPU is known as
the process in running state. In single user system, there is only one process which is in the
running state. In multiuser system, there are multiple processes which are in the running state.
Blocked State: The process is currently waiting on external event such as an I/O operation is said
to be in blocked state. After the completion of I/O operation, the process from blocked state enters
in the ready state and from the ready state when the process turn will come it will again go to
running state.
Terminated / Halted State: The process whose operation is completed, it will go the terminated
state from the running state. In halted state, the memory occupied by the process is released.
Page 25 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER – 15 EXAMINATION
OR
Page 26 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER – 15 EXAMINATION
(a) Describe many to one and one to many multithreading model with diagram. Explain
advantages of each (any two).
(Two model: Description of each model with diagram – 2 Marks, any two advantages of each
model– 1 Mark each)
[**Note- for one to many multithreading model, one to one model, many to many model or any
other relevant multithreading description shall be considered]
Ans:
1. Many to One model:
This model maps many user level threads to one kernel level thread. Thread management is done
by thread library in user space.
Advantages:-
1. It is an efficient model as threads are managed by thread library in user space.
2. Portable: Because user level threads packages are implemented entirely with standard
Unix and POSIX library calls, they are often quite portable
Page 27 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER – 15 EXAMINATION
It maps each user thread to a kernel thread. Even a thread makes a blocking call;
Other thread can run with the kernel thread.
Advantages:-
1. It allows multiple threads to run in parallel on multiprocessors.
2. Multithreaded OS interface: when one user thread and its kernel thread block, the
other user threads can continue to execute since their kernel threads are unaffected
Page 28 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER – 15 EXAMINATION
Advantages:-
1. Threads can run in parallel or multiprocessor
2. When a thread performs blocking system call, the kernel can schedule anther tread for
execution.
3. Developer can create as many user threads as required
OR
Page 29 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER – 15 EXAMINATION
(b) Calculate average waiting time for FCFS and SJF for following table:
Process Arrival time Burst time
P1 0 8
P2 1 4
P3 2 9
P4 3 5
(For each scheduling – Gantt chart – 1 Mark, waiting time calculation - 2 Marks, average
waiting time – 1 Mark)
Ans:
FCFS
Gantt chart
P1 P2 P3 P4
0 8 12 21 26
Page 30 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER – 15 EXAMINATION
P1=0
P2=(8-1)=7
P3=(12-2)=10
P4= (21-3)=18
=0+7+10+18/4
SJF
P1 P2 P4 P1 P3
0 1 5 10 17 26
Waiting time
P1=0+(10-1)=9
P2=0
P3=(17-2)=15
P4= (5-3)=2
=9+0+15+2/4
(c) Explain how UNIX is differ from LINUX w.r.t. architecture, applications, case of operation
and system requirement.
(Difference - 2 Marks to each point)
[**Note Any relevant explanation shall be consider]
Page 31 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER – 15 EXAMINATION
UNIX LINUX
Small scale (is available on PA- Highconfiguration(Originally
RISC and Itanium machines. developed for Intel’s x86
Architecture Solaris also available for hardware, ports available for
x86/x64 based systems.) over two dozen CPU types
including ARM)
Command base (The UNIX GUI based(Linux can be
operating system is used in installed on a wide variety of
internet servers, workstations & computer hardware, ranging
PCs. Backbone of the majority from mobile phones, tablet
of finance 32 infrastructure and computers and video game
many 24x365 high availability consoles, to mainframes and
solutions. GUI: Initially Unix supercomputers. GUI: Linux
Applications was a command based OS, but typically provides two GUIs,
later a GUI was created called KDE and Gnome. But Linux
Common Desktop GUI is optional.)
Environment. Most
distributions now ship with
Gnome.)
Page 32 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER – 15 EXAMINATION
Real time systems are used in environment where a large number of events, mostly external to
the computer system, must be accepted and processes in a short time or within certain deadlines.
Such applications include real-time simulations, flight control, industrial control, military
applications etc.
A primary objective of real-time systems is to provide quick event response time and thus meet
the scheduling deadlines. User convenience and resource utilization are of secondary concern to
real-time system designers.
In Real time systems, processor is allocated to the highest priority process among those that are
ready to execute. Higher priority processes preempt execution of the lower priority processes.
This form is called as ‘priority –based preemptive scheduling’.
The primary functions of the real time operating system are to:
1. Manage the processor and other system resources to meet the requirements of an application.
2. Synchronize with and respond to the system events.
3. Move the data efficiently among processes and to perform coordination among these processes.
Example: - video transmission, each picture frame and audio must be transferred at fixed rate.
Page 33 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER – 15 EXAMINATION
(b) What is system call? Explain open ( ) system call and close ( ) system call.
(Description of system call – 2 Marks, open ( ) system call -1 Mark, close ( ) system call -1
Mark)
Ans:
System Calls: System calls are programming interface to the services provided by the operating
system
1. Each system call associated with a particular number.
2. System call interface maintains a table indexed according to these numbers.
3. The system call interface invokes intended system call in operating system kernel and returns
status of the system call and any return values.
4. The caller needs to know nothing about how the system call is implemented. Just needs to
obey API and understand what OS will do as a result call.
5. Most details of operating system interface hidden from programmers by API. It is managed by
run-time support library.
Page 34 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER – 15 EXAMINATION
Page 35 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER – 15 EXAMINATION
Page 36 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER – 15 EXAMINATION
Page 37 of 37