Operating Systems Fall 24 25
Operating Systems Fall 24 25
• Discuss deadlock detection, as well as methods for recovering from a deadlocked state.
• Discuss the role of memory in an Operating System. Implement error-handling techniques using exception
handling.
• Implement error-handling techniques using exception handling.
• Create multithreaded programs and explain the advantage compared with single threaded programs.
Midterm (Week 8)
Week 9 CO4, CO3 Process Scheduling Lecture: Final term
Justifying Group Study. exam, Lab
Subject Topic: Lab: Exam
Multiple-Processor Scheduling,
Perform Exercise and
Real-Time Scheduling, Algorithm
Coding.
Evaluation.
Lab:
1. Simulating CPU scheduling
algorithm using any programming
language, Simulation of Process
scheduling algorithm: Feedback
policy, Simulation of I/O requests
PO
PO Indicators Definition
Indicator Domain K P A
(As per the requirement of WKs)
ID
Analyze solutions for complex engineering problem reaching Cognitive P1
K3
PO-b-3 substantiated conclusion. Level 5 P3
(Evaluating) P7
© Dept. of Computer Science, FST, AMERICAN INTERNATIONAL UNIVERSITY-BANGLADESH (AIUB) Page 4 of 9
CSC 3214 OPERATING SYSTEMS
XI – K, P, A Definitions
The mapping between Course Outcome(s) (COs) and The Selected Assessment method(s) and the mapping between
Assessment method(s) and Evaluation Rubric(s) is shown below:
Mapped Assessment
COs Description Assessment Rubric
POs Method
CO1 Differentiate how different types of the modern
operating system work, their underlying fundamental
concepts, techniques, and applications. Distinguishing Rubric for Quiz
PO-b-4 Quiz
how these different techniques and algorithms are used
to achieve optimum hardware and software resource
utilization.
CO2 Compare and analyze different types of CPU
Scheduling, Process Management, Synchronization, Rubric for Term
PO-b-4 Term Exam Exam
deadlock handling mechanisms to get the optimum
resource allocation and utilization.
CO3 Explain various shell commands and system calls to Rubric for Quiz/
Quiz/ Term Term Exam
implement Shell Scripts for various fundamental task PO-b-3
Exam
automation.
CO4 Analyze and compare user access control, OS security,
and protection mechanisms to prevent operating
PO-b-4 Term Exam Rubric for Term
system vulnerability and to ensure the OS stability.
Compare virtual, cloud, and distributed OS, etc. Exam
CO1: Differentiate how different types of the modern operating system works, their underlying fundamental
concepts, techniques, and applications. Distinguishing how these different techniques and algorithms are used to
achieve optimum hardware and software resource utilization.
CO2: Compare and analyze different types of CPU Scheduling, Process Management, Synchronization, deadlock
handling mechanisms to get the optimum resource allocation and utilization.
Assessment Missing/Incorrect Inadequate Satisfactory Excellent
Attribute/Criteria (0) (1-2) (3-4) (5)
Not develop a clear
Develop a moderate
understanding and Develop a moderate
understanding and Develop a clear
not show any understanding and
few relevant understanding and
relevant knowledge knowledge of
Content knowledge of knowledge of algorithms
of algorithms algorithms related to
knowledge algorithms related to related to operating
related to operating operating system
operating system system optimization and
system optimization optimization and
optimization and resource allocations.
and resource resource allocations.
resource allocations.
allocations.
Not understand and Moderately Moderately
not apply any understand and understand and
appropriate apply few apply appropriate Understand and apply
algorithms for appropriate algorithms for appropriate algorithms
Completeness
resource algorithms for resource for resource optimization
optimization and resource optimization and and problem solutions.
problem solutions. optimization and problem solutions.
problem solutions.
CO3: Explain various shell commands and system calls to implement Shell Scripts for various fundamental task
automation.
Assessment Missing/Incorrect Inadequate Satisfactory Excellent
Attribute/Criteria (0) (1-2) (3-4) (5)
Moderately
Not understand and Moderately
understand and
not present the understand and
present the Understand and present
knowledge of present the
knowledge of the knowledge of
scripting commands knowledge of
Content scripting commands scripting commands for
for various scripting commands
knowledge for various various fundamental
fundamental for few fundamental
fundamental automation tasks and
automation tasks automation tasks
automation tasks solutions to problems.
and solutions to and solutions to
and solutions to
problems. problems.
problems.
Not develop the Moderately develop Moderately develop
ability to articulate the ability to the ability to Develop the ability to
various automation articulate few articulate various articulate various
Problem analysis tasks and problems automation tasks automation tasks automation tasks and
and solutions to relevant solutions and problems to and problems to problems to relevant
through shell relevant solutions relevant solutions solutions through shell
scripting. through shell through shell scripting.
scripting. scripting.
CO4: Analyze and compare user access control, OS security, and protection mechanisms to prevent operating
system vulnerability and to ensure the OS stability. Compare virtual, cloud, and distributed OS, etc.
Assessment Missing/Incorrect Inadequate Satisfactory Excellent
Attribute/Criteria (0) (1-2) (3-4) (5)
Not demonstrate a Moderately Moderately
clear understanding demonstrate a clear demonstrate a clear
Demonstrate a clear
of concepts related understanding of understanding of
understanding of
to Operating concepts related to concepts related to
concepts related to
System securities Operating System Operating System
Fundamental Operating System
and protection securities and securities and
concepts and securities and protection
concerns, along protection concerns, protection concerns,
principles concerns, along with the
with the along with the few along with the
fundamentals of modern
fundamentals of fundamentals of fundamentals of
cloud and distributed
modern cloud and modern cloud and modern cloud and
Operating Systems.
distributed distributed distributed
Operating Systems. Operating Systems. Operating Systems.
Not develop the Moderately develop Moderately develop
ability to identify the ability to identify the ability to identify
Develop the ability to
Operating System Operating System Operating System
identify Operating
risks and security risks and security risks and security
System risks and security
Problem analysis concerns and not concerns and concerns and
concerns and provide
and solutions provide appropriate provide few provide appropriate
appropriate solutions for
solutions for the appropriate solutions solutions for the
the optimum protection
optimum protection for the optimum optimum protection
of the systems.
of the systems. protection of the of the systems.
systems.
1. Silberschatz, A and Galvin, P (and Gagne, G), Operating System Concepts (Ninth Edition or later edition)
2. Modern Operating Systems (3rd Edition) by Andrew S. Tanenbaum
3. William S. Davis and T. M. Rajkumar, Operating Systems, A Systematic View, Sixth Edition, Addison Wesley,
2004
4. Kanetkar, Yashavant P., Unix shell programming, BPB Publications, 1996
5. Online tutorials. (You will be guided in the class)
XVI – Verification
Dr. Md. Abdullah-Al-Jubair Prof. Dr. Dip Nandi Mr. Mashiour Rahman
Director Associate Dean, Dean,
Faculty of Science & Information Faculty of Science & Information Faculty of Science & Information
Technology Technology Technology