CSOPERATING SYSTEMS QUESTION BANK. SUB. Why is the Operating System viewed as a resource allocator & control program? 3. What is the. Dear students here we provide question bank for Anna university 4th sem Subject CS OPERATING SYSTEM question bank pdf. you can download the OS. CS/ CS 45 / CS / CS / Operating Systems Part B Question Bank With Answers CSE,IT 4th Sem Semester regulation
Author: | Mikalkis Salrajas |
Country: | Thailand |
Language: | English (Spanish) |
Genre: | Politics |
Published (Last): | 15 July 2006 |
Pages: | 25 |
PDF File Size: | 5.57 Mb |
ePub File Size: | 16.73 Mb |
ISBN: | 619-5-74947-927-7 |
Downloads: | 91738 |
Price: | Free* [*Free Regsitration Required] |
Uploader: | Taugul |
Give a detailed description about deadlocks and its characterization. State the advantage of multiprocessor system. What is Demand Paging? Consider the following page-reference string: Mathematics 1 – January and May Question What are the drawbacks of Monitors? What problems could occur if a system allowed a file system to be mounted simultaneously at more than one location?
Explain how semaphores can be used to deal with n-process critical section problem.
What is the use of inter process communication? Discuss about the UNIX file system in detail.
‘+relatedpoststitle+’
Defines a path from the current directory. Consider the following set of process, with the length of the CPU-burst time given in milliseconds: This strategy produces the smallest leftover hole. Users desire that the system should be convenient and easy to use, easy to learn, reliable, safe and fast.
The section of the code implementing ban request is the entry section. E Civil 5th Semester Question The kernel maintains one vnode structure for each active file or directory. Operating system does not allow child to continue if its parent terminates. Rather than swapping the entire process into main memory, a lazy swapper is used.
Page -1 – CS – OPERATING SYSTEMS QUESTION BANK UNIT – I TWO MARKS | karthik M –
What is a Path Name? What is preemptive and no preemptive scheduling? What are the various layers of a Xystem System? Write in detail about Virtual memory.
For long processes, this rate may be one process per hour; for short transactions, throughput might be 10 processes per second. Explain the backup and recovery of files.
When a system call is executed, it is treated as by the hardware as software interrupt. Fork is a System calls by which a new process is created. The value of p is expected to be b t u close to 0; that is, there will opefating only a few page faults.
Deleting a file with one path deletes the file in all the other paths. Creating index for the file, indexed sequential access method ISAM etc. What is low-level formatting? When the allocated memory may be slightly larger than the requested memory, the difference between these operatinb numbers is internal fragmentation.
It can be also used to solve various synchronization problems.
Operating system OS CS2254 previous year question papers
Explain about operatign methods used to prevent deadlocks 7. Each process has segment of code called a critical section, in which the process may be changing common variables, updating a table, writing a file. Each level in the design uses the feature of the lower levels to create new features for use by higher levels. What are the advantages of Linked Allocation?
As a process enters a system, they are put into a job queue. What is a semaphore? Help Center Find new research papers in: What is the total distance in cylinders that the disk arm moves to satisfy the entire pending request for each of the following disk-scheduling algorithms?
When other instructions are needed, they are e loaded into space occupied previously by instructions that are no longer needed. What are batch systems? This feature is usually used with system libraries, such as language subroutine libraries.
CSOperating Systems Question Bank Collection
The secondary memory is usually a high speed disk. What is a Pure Demand Paging? Differentiate tightly coupled systems and loosely coupled systems. What are the advantages of Contiguous Allocation? What are the different types of Access? Thank you for your comment. Write notes about the protection strategies provided for files. Each process executing the shared data variables excludes all others from doing so simultaneously.
What is the basic approach of page replacement? Access to the cached: List the services provided by an Operating System? RAID’s qustion designs involve two key design goals: