B.TECH - Semester 5 operating systems Question Paper 2021 (mar)
Practice authentic previous year university questions for better exam preparation.
Sample Questions
- Give any two examples of information maintenance system calls.
- How do the semantics of Immutable-Shared-File allow sharing of the file?
- Is a monitor better than a semaphore? Why?
- Compare and contrast paging with segmentation. In particular, describe issue related to fragmentation.
- Consider a system consisting four resources of the same type that are shared by three processes, each of which needs at most two resources. Is this system deadlock free? Why? $$ \text { ( } 5 \times 4=20 \text { Marks) } $$
- (a) Compare and contrast Multiprocessor systems and clustered systems. 12
- (b) Write a note on real time operating systems. ..... 8
- (a) Discuss various file allocation strategies for disk space management. 12
- (b) With a diagram, explain the three main components of a Linux system. 8
- Consider the following set of processes, with the length of the CPU burst time give in milliseconds: | Process | Burst Time | Priority | Arrival Time | | :---: | :---: | :---: | :---: | | P1 | 10 | 3 | 2 | | P2 | 1 | 1 | 0 | | P3 | 2 | 3 | 3 | | P4 ...
- What is critical section problem and explain two process solutions and multiple process solutions?
- (a) Compare the memory organization schemes of contiguous memory allocation, pure segmentation, and pure paging with respect to external fragmentation and internal fragmentation.
- (b) Analyze the different between hierarchical paging and inverted page tables techniques.
- Discuss the LRU and FIFO replacement algorithms. Consider the following page reference string: $1,2,3,4,2,1,5,6,2,1,2,3,7,6,3,2,1,2,3,6$. All frames are initially empty. How many page faults would occur for the LRU and FIFO replacement algorithms, as...
- (a) Consider a resource allocation system with multiple instances of each resource type. Discuss the various data structures, safety algorithm and resource-request algorithm of the Banker's algorithm.
- (b) Consider the following snapshot of a system that employs the Banker's algorithm for resource allocation. | | Allocation | Max | Available | | :---: | :---: | :---: | :---: | | | A B C D | A B C D | A B C D | | $P_{0}$ | 0012 | 0012 | 1520 | | ...
- (i) Is the system in a safe state? If the system is safe, show how all the process could complete their execution successfully. If the system is unsafe, show how deadlock might occur. (ii) If a request from process from $P 1$ arrives for $(0,4,2,0)$,...
- (a) Make a list of security concerns for a computer system for a bank. For each item on your list, state whether this concern relates to physical security, human security, or operating system security.
- (b) What are two advantages of encrypting data stored in the computer system? 8