Accounting and Financial Management (3) Analog and Digital Communication (2) Artificial Intelligence (2) BE(Civil) (2) BE(CSE) (83) BE(ECE) (11) BE(Mech) (10) Business Processes (3) C# and .NET Framework (2) Communication Skills (1) Compiler Design (1) COMPONENT BASED TECHNOLOGY (1) COMPUTER ARCHITECTURE (1) COMPUTER GRAPHICS and MULTIMEDIA SYSTEMS (6) COMPUTER INTEGRATED MANUFACTURING (1) Computer Networks (9) Computer Organization (2) Computer Programming (1) Consumer Behaviour (1) Control Systems (1) Cryptography and Network Security (3) Datastructures and Algorithms (10) Datawarehousing and Mining (1) DBMS (5) DESIGN AND ANALYSIS OF ALGORITHMS (9) DESIGN OF MACHINE ELEMENTS (1) DIGITAL PRINCIPLES AND SYSTEMS DESIGN (3) Discrete Mathematics (1) DISTRIBUTED COMPUTING (2) DSP (8) DYNAMICS OF MACHINERY (2) Economic Foundations (1) ELECTRICAL ENGINEERING (1) ELECTRICAL ENGINEERING AND CONTROL SYSTEMS (1) Electromagnetic Fields (3) ELECTRONIC CIRCUITS (1) ELECTRONIC COMMERCE (4) ELECTRONIC DEVICES AND CIRCUITS (1) EMBEDDED SYSTEMS (1) FUNDAMENTALS OF COMPUTING (2) Graphics and Multimedia (3) HEAT AND MASS TRANSFER (1) HUMAN RESOURCE MANAGEMENT (1) Internet Programming (9) INTRODUCTION TO FINITE ELEMENT ANALYSIS (1) Legal Aspects of Business (1) MANAGEMENT INFORMATION SYSTEMS (1) Marketing Management (1) MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE (4) MATHEMATICS - I (1) MBA (9) MCA (83) MCA QUESTION BANK (2) MECHATRONICS (1) MicroProcessor and Controllers (4) MICROPROCESSORS AND APPLICATIONS (5) MIDDLE WARE TECHNOLOGIES (3) MOBILE COMPUTING (5) NETWORK PROGRAMMING (1) NUMERICAL METHODS (1) OBJECT ORIENTED ANALYSIS AND DESIGN (5) Object Oriented Programming (18) Operating System (2) OPERATING SYSTEMS (9) Organizational Behaviour (2) POWER ELECTRONICS (1) Principles of Management (8) PROBABILITY AND QUEUEING THEORY (2) Probability and Statistics (1) PROBLEM SOLVING AND PROGRAMMING (2) PROCESS PLANNING AND COST ESTIMATION (1) PROFESSIONAL ETHICS AND HUMAN VALUES (1) RANDOM PROCESSES (1) RESOURCE MANAGEMENT TECHNIQUES (2) ROBOTICS (1) Security analysis (1) Service Marketing (1) SIGNALS AND SYSTEMS (1) Software Engineering (8) SOFTWARE PROJECT MANAGEMENT (4) SOFTWARE QUALITY MANAGEMENT (2) System Software (2) TCP/IP PROTOCOL SUITE (3) Theory of Computation (4) Total Quality Management (2) UNIX AND NETWORK PROGRAMMING (4) Visual Programming (2) WEB GRAPHICS (2) WEB TECHNOLOGY (2) XML AND WEB SERVICES (4)

Friday, July 4, 2008


PART-A 10x2 = 20 marks

1. Mention any two essential properties of real time systems.

2. Processes call the operating system with system call interrupt instructions. Why can’t processes make ordinary procedure calls to the operating systems?

3. What is meant by the context of a process?

4. Mention the methods for deadlock recovery in a system.

5. Consider the following set of processes, with the length of the CPU-burst time and the arrival time given in milliseconds:

Process Arrival Time Burst Time

______ ___________ __________

P1 0 75

P2 10 40

P3 10 25

P4 80 20

P5 85 45

a. Draw a Gantt chart illustrating the execution of these processes using preemptive SJF scheduling algorithm.

6. What is the relationship between program locality and TLB hit rate?

7. What is Belady’s anomaly?

8. What is thrashing?

9. Mention the advantages and disadvantages of continuous allocation of files.

10. List the main components of a Linux system.

PART-B 5x16 = 80 marks

11. (i) Explain the MS-DOS system structure with a neat diagram. (8)

(ii) Write notes on Hardware protection. (8)

12. (a) (i)Describe the actions taken by a kernel to context switch between kernel-level threads. (4)

(ii) Consider the following snapshot of a system:

Allocation Max Available

__________ ____ ________


P0 0 0 1 2 0 0 1 2 1 5 2 0

P1 1 0 0 0 1 7 5 0

P2 1 3 5 4 2 3 5 6

P3 0 6 3 2 0 6 5 2

P4 0 0 1 4 0 6 5 6

Answer the following questions using the banker’s algorithm.

a. What is the content of matrix Need? (2)

b. Is the system in a safe state? If yes, give the safe sequence. (2)

c. If a request from process P1 arrives for (0,4,2,0) can the request be granted immediately? (4)

(iii)Distinguish between short term, long term and medium term scheduling.(4)


b) (i) How does a semaphore solve the critical section problem? Discuss whether semaphores satisfy the three requirements for a solution to the critical section problem. (8)

(ii) A barbershop consists of a waiting room with n chairs and the barber room containing the barber chair. If there are no customers to be served, the barber goes to sleep. If a customer enters the barbershop and all chairs are occupied, then the customer leaves the shop. If the barber is busy but chairs are available, then the customer sits in one of the free chairs. If the barber is asleep, the customer wakes up the barber. Write a program to coordinate the barber and the customers. (8)

13. a. (i) Given memory partitions of 100K, 500 K, 200 K, and 600K (in order), how would each of the First-fit, Best-fit, and Worst-fit algorithms place processes of 212K, 417K, 112K, and 426K (in order)? Which algorithm makes the most efficient use of memory? (8)

(ii) Write down the different issues in real time scheduling. (8)


b. (i)Explain segmentation with a neat diagram. (8)

(ii) Consider a variation of round-robin we will call progressive round-robin. In progressive round-robin, each process has its own time quantum. This starts out at 50 ms, and increases by 50 ms each time it goes through the round-robin queue. Give the advantages and disadvantages of this variant over ordinary round-robin. (8)

14. a. What is the cause of thrashing? Explain the methods by which thrashing could be controlled. (16)


b. Describe different schemes for defining the logical structure of a directory. (16)

15. a. Discuss on the following disk scheduling algorithms:

Shortest Seek Time First, First Come First Served, SCAN, C- LOOK.



b. Explain briefly how process management is done in Linux. (16)

No comments:

Post a Comment