Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
www.andhracolleges.com
1. (a) Discuss the Operating System design hierarchy with an example.
(b) Explain the applications of Windows NT Operating System.
4. (a) What are the conditions that must satisfy for deadlock occurrence and explain
them.
(b) Is the deadlocks problem preventable? Justify your answer with example and
diagram. [8+8]
5. (a) Enumerate the reasons for allowing two or more processes to, all have access
to particular region of memory.
(b) In a fixed partitioning scheme, what are the advantages of using unequal size
www.andhracolleges.com
partitions?
(c) What is the difference between internal and external fragmentation?
(d) What are the distinctions among logical, relative and physical addresses?
[4+4+4+4]
⋆⋆⋆⋆⋆
www.andhracolleges.com
1. Describe the Objectives and functions of Operating System. Also explain the dif-
ferent services provided by the operating system.
2. Discuss about the following:
(a) User-level threads
(b) Kernel-level threads
(c) Multi-threadings.
[5+5+6]
4. (a) What are the conditions that must satisfy for deadlock occurrence and explain
them.
(b) Is the deadlocks problem preventable? Justify your answer with example and
diagram. [8+8]
5. Consider a memory management system with demand paging. There are three
processes P1, P2, P3 which have one page of private memory each. Moreover P1
www.andhracolleges.com
and P2 are sharing an array A which fits entirely into one memory page. Similarly,
P2 and P3 are sharing an array B, which fits into a memory page.
(a) Let all the data for the processes be located into physical memory. Draw a pos-
sible memory allocation diagram, give the page tables for the three processes.
(b) Assume that process P1 gets swapped out of memory entirely. How are the
page tables changing.
(c) Assume that process P1 gets swapped back into memory. Give the page tables
in this situation. [5+5+6]
6. (a) What are preemptive and non-preemptive scheduling policies?
(b) Describe non-preemptive scheduling policies. [8+8]
7. (a) Explain file system software architecture.
(b) Explain the functions of a file management system with a diagram. [8+8]
8. What do you understand by Trusted systems? Draw a figure of reference monitor
concept and explain. [5+5+6]
⋆⋆⋆⋆⋆
Seminar Topics - Scholarships - Admission/Entrance Exam Notifications
1 ofUSA-UK-Australia-Germany-France-NewZealand
1 Universities List
www.andhracolleges.com
1. With the help of neat block diagram, describe the computer components with an
example.
4. How the problem among dining philosophers can be resolved? Suggest a suitable
[6+5+5]
[8+8]
algorithm. [8+8]
5. (a) Consider a buddy system in which a particular block under the current allo-
cation has an address of 011011110000
i. If the block is of size 4 what is the binary address of its buddy.
ii. If the block is of size 16, what is the binary address of its buddy.
(b) A virtual address in a paging system is equivalent to a pair (p, w), in which
p is a page number and w is a byte number within the page. Let z be the
www.andhracolleges.com
number of bytes in a page. Find algebraic equation that shows p as function
of z and w.
(c) Why is the capability to relocate a process desirable?
(d) Why is it not possible to enforce memory protection at compile time.[4+4+4+4]
⋆⋆⋆⋆⋆
www.andhracolleges.com
1. (a) Discuss the Operating System design hierarchy with an example.
(b) Explain the applications of Windows NT Operating System.
3. (a) Explain different conditions of process interaction with respect to the degree
[8+8]
[8+8]
4. (a) What are the conditions that must satisfy for deadlock occurrence and explain
them.
(b) Is the deadlocks problem preventable? Justify your answer with example and
diagram. [8+8]
www.andhracolleges.com
5. (a) What elements are typically found in a page table entry? Briefly define each
element.
(b) What is the purpose of translation look aside buffer?
(c) What is the difference between resident set management and page replacement
policy? [6+5+5]
⋆⋆⋆⋆⋆