0% found this document useful (0 votes)
78 views4 pages

Operating Systems Question Bank BCS303

Uploaded by

gu.tianlang.89
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
78 views4 pages

Operating Systems Question Bank BCS303

Uploaded by

gu.tianlang.89
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

MODULEWISE QUESTION BANK

SUB NAME: OPERATING SYSTEMS

SUB CODE: BCS303

MODULE I

1. Explain dual mode of operating system with neat diagram.


2. Explain the Operating System structures with neat diagrams.
3. Explain the services provided by the os for the user and efficient operation of the system.
4. What is Inter Process Communication? Explain Message Passing Systems.
5. Explain different types of system calls.
6. Explain different views of operating systems.
7. Explain the concept of virtual machines.
8. Differentiate client server computing and peer-to-peer computing.
9. Explain the types of clustered system.
10. Differentiate between Multi-programming, Multi-tasking (Time sharing) and Multi-processing system

Module II

1 Explain the different states of a process with state diagram and PCB.
2 Explain any three threading issues with respect to multithreaded programming.
3 Explain with diagram Multithreading Models.
4 With neat diagram explain Multilevel queue scheduling
5 Consider the following set of processes 4

Process Arrival time Burst Time


P0 0 6
P1 1 3
P2 2 1
P3 3 4
Calculate the average waiting time and turnaround time and draw Gantt chart for FCSFS,Round Robin
scheduling (Time Quantum = 2ms).

6 Explain scheduler in process execution.


7 Explain in detail about multiple processor scheduling .
8 Calculate average waiting time and turn around time for the following snap shot of the process using
a. Non preemptive SJF
b. Non preemptive priotity

MODULE III

1. Explain Peterson solution problem.


2. Explain Readers Writers problem with solution provided by semaphore.
3. Explain diners philosophers problem with diagram
4. Explain Bounded buffer problem.
5. Write a note on Monitors.
Question Bank
Course Title: Operating Systems Course Code: BCS303
MODULE-III

1. What is deadlock? What are the necessary conditions for the deadlock to occur.?
2. Different methods to recovery from deadlock.
3. What is wait-for-graph? How it is useful for detection of deadlock?
4. Determine if the following system is in a safe state using the Banker's Algorithm.
A system with three processes (P1, P2, P3) and three resource types (R1, R2, R3). The following tables
provide the allocation and maximum resource matrices.
Allocation Table:

Maximum Table:

Available Resources: R1=3, R2=3, R3=2

5. Apply the safety algorithm to check whether the following system is in safe state and if so, write the safe
sequence for the snapshot given below:
Process Allocation Max Available

A B C A B C A B C

P0 0 1 0 7 5 3 3 3 2

P1 2 0 0 3 2 2

P2 3 0 2 9 0 2

P3 2 1 1 2 2 2

P4 0 0 2 4 3 3

6. Determine whether the following system is in safe state and write the safe sequence by using Banker’s
algorithm for the snapshot given below:
Process Allocation Max Available

A B C D A B C D A B C D

P1 2 0 0 1 4 2 1 2 3 3 2 1

P2 3 1 2 1 5 2 5 2

P3 2 1 0 3 2 3 1 6
P4 1 3 1 2 1 4 2 4

P5 1 4 3 2 3 6 6 5

7. Determine the following scenario and draw the Resource-Allocation Graph (RAG) and the
corresponding Wait-for Graph (WFG):
R1 is allocated to P1, while P1 is waiting for R2.
P2 is allocated R2 and is waiting for R3.
R3 is allocated to P3, and P3 is not waiting for any resource.

MODULE-IV
1. What are the commonly used strategies to select a free hole from the available holes?
2. With neat diagram, explain paging hardware with TLB.
3. What is segmentation? Explain with a neat diagram.
4. Explain the concept of demand paging and discuss how it improves memory utilization in a virtual
memory system.

5. Explain the concept of thrashing and model used to control it.


6. Calculate the number of page faults using optimal and LRU replacement algorithms for the page
reference string: 7,0,1,2,0,3,0,4,2, 3,0,3,2,1,2,0,1,7,0,1 with 3 memory frames.

7. Describe the steps in handling page fault using appropriate diagram.

8. Apply the FIFO Page Replacement Algorithm to the following sequence of page requests:
9. 7, 0, 1, 2, 0, 3.
Assume a memory with 3-page frames.
Demonstrate the step-by-step process of replacing pages and compute the number of page faults.

10. Apply the Optimal Page Replacement Algorithm to the following page reference string:
3, 2, 1, 3, 4, 1, 6, 2.
Assume the memory has 3 frames.
Demonstrate the step-by-step process to determine the total number of page faults.

11. Explain the role of page replacement algorithms in virtual memory management and compare the
performance of FIFO and Optimal Page Replacement algorithms.

12. Apply first fit, best fit and worst fit algorithms and explain the processing with the five memory
partitions 100 KB, 500 KB, 200KB, 300KB, 600KB and processes of 212KB, 417KB, 112 KB,
426KB size. Which algorithm makes efficient use of memory?

MODULE-V
1. Explain the following file allocation methods:
i. Contiguous allocation
ii. Indexed allocation.

2. Describe how the indexed allocation method organizes file allocation using the following example:
Assume a file <A= of 5 blocks and an index block [6] containing the pointers [7, 12, 5, 9, 4]. Describe
the physical block sequence for the file based on the given data.

3. Explain FIFO and SCAN disk scheduling algorithms with the help of disk head schedule diagram for
the following scenario: A drive has 200 cylinders 0 to 199, Head starts at 53 to serve the request
queue: 98, 183. 37, 122, 14, 124, 65, 67. Also write the total head movements.
4. What is file system? Explain file attributes?
5. Write the basic operations on the files?
6. Explain various file allocation methods with diagram.
7. Explain how free space is managed?

8. Describe the access matrix model of protection in operating systems along with domain as objects,
domain switching and copy operation.
9. Demonstrate how the access matrix model can represent the following scenario:
A system contains three domains (D1, D2, D3) and three objects (O1, O2, O3).
Use the access matrix to show which domain has "read" and "write" permissions for each object and
illustrate a transition in access rights.

10. Explain SSTF and C-LOOK disk scheduling algorithms with the help of disk head schedule diagram
for the following scenario: A drive has 200 cylinders 0 to 199, Head starts at 53 to serve the request
queue: 98, 183. 37, 122, 14, 124, 65, 67. Also write the total head movements.
11. Distinguish the following directory structures with their diagram, advantages and disadvantages:
i. single level directory structures
ii. two-level directory structures
iii. acyclic graph directory structure
iv. tree structured directory

Common questions

Powered by AI

Multilevel queue scheduling allocates processes to queues based on priority or type (e.g., system, interactive) and assigns a specific scheduling algorithm to each queue. It offers advantages in managing diverse workloads with different performance needs but can cause starvation for lower-priority processes and complexity in managing inter-queue scheduling .

Demand paging loads pages into memory only when required, reducing unnecessary memory use and swapping. This approach decreases load times and maximizes available memory for other processes, enhancing system performance during multitasking. However, frequent page faults and potential thrashing need efficient handling mechanisms, such as page replacement algorithms, to maintain efficiency .

The Banker's Algorithm dynamically examines resource allocation requests to ensure safe state transitions, preventing deadlocks by simulating future allocations. It assesses the availability of resources and impending requests, enabling safe sequence determination. While effective in theory, its complexity and computational overhead limit practical applicability in fast-paced environments .

Multi-programming allows multiple jobs to reside in memory at once, improving CPU utilization by reducing idle time. Multi-tasking extends this by allowing multiple tasks to appear to run simultaneously via context switching, enhancing responsiveness (Time Sharing). Multi-processing involves using multiple CPUs to execute processes, improving throughput and computational power but requiring sophisticated scheduling and synchronization .

Virtual machines abstract hardware resources, allowing multiple OS instances to run concurrently on a single physical machine. They improve resource utilization by isolating applications and providing flexibility in resource management. However, they introduce overhead and require efficient hypervisors to manage resource allocation and virtualization environments .

Thrashing mitigation involves techniques like ensuring sufficient working set size through load control, implementing page replacement algorithms (e.g., Least Recently Used) effectively, and utilizing system and access pattern-based tuning. These strategies aim to balance memory allocations and optimize page loading to prevent excessive paging-induced performance degradation .

Dual-mode operating systems enhance security and stability by allowing user mode and kernel mode operation. Benefits include protection from user program abuse and misbehavior, as system resources are accessed by switching to kernel mode. Challenges include complex context switching between modes, which can incur performance overhead and increase design complexity .

Client-server computing centralizes resources on servers, facilitating management and security with a specific architecture. In contrast, peer-to-peer computing distributes resources across all systems, promoting scalability and robustness but posing challenges in security and resource management. Communication in client-server is directed through servers, while peer-to-peer involves direct system interactions .

FIFO Page Replacement replaces pages in chronological order, making it straightforward but potentially inefficient by replacing frequently used pages. The Optimal Page Replacement algorithm, though theoretical, replaces the page that won't be used for the longest period, minimizing faults. Compared, Optimal offers lower fault rates but is unfeasible as it requires future knowledge, unlike FIFO's practicality .

File allocation methods like contiguous and indexed allocation determine data organization on storage. Contiguous allocation offers fast access due to sequential storage but limits flexibility and can cause fragmentation. Indexed allocation allows random access and flexible growth via pointers in index blocks but introduces overhead and slower access due to indirect block referencing. Trade-offs involve balancing access speed, flexibility, and overhead management .

You might also like