Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
Illustrate the different techniques employed to handle deadlocks. Describe the three kinds of dynamic storage allocation.
Name all three types of hardware protection and explain each briefly. Describe three additional Operating System functions which ensure efficient system operations instead of assisting the user.
What is CPU scheduling? Explain the characteristics of CPU scheduling algorithms. What do you mean by deadlock avoidance? Describe the Banker’s algorithm for deadlock avoidance with suitable exa
What is external fragmentation? Discuss different ways of handling the problem of external fragmentation.
What is a Process Control Block? Explain each field in the PCB. What is meant by race condition of concurrent access ? Explain with an example.
Write down the differences between user-level and kernel-level threads? Under what situation is one type better than the other? Explain the cause of thrashing? How does the system detect thrashing?
Name five problems with solutions that might take place while installing the Linux from Scratch (LFS) system.
For the given, cmd1 and cmd2 are arbitrary UNIX commands, and file1 and file2 are files owned by you. Write UNIX (bash) commands to:
What is the role of device independent layer of device driver? In brief explain why a micro-kernel operating system structure is more robust than a monolithic (simple) operating system structure.
Name all four contemporary technologies that are related to Grid computing. What are the major distinctions between conventional distributed computing and Grid computing?
Describe the term “Deadlock”. Also explain Deadlock Detection and Deadlock Recovery with the help of different examples.
Describe four services of the operating systems. Make a distinction among the short term, medium term and long term scheduling that are provided by multi-tasking operating systems.
What are the differentiations between a write-allocate and no-write-allocate policy in a cache? With the aid of a fully labelled diagram, make a distinction between direct and associative mapping in c
Describe the meaning of Instruction Set Architecture. With the use of an example, describe how pipelining in microprocessors enhances the throughput of instruction execution.
Provide the four major functions of operating system. Distributed network architecture is whereby services are distributed and implemented among many computers. Give two merits and two demerits of t
Describe the process of mapping data structures and data items to messages. Name five characteristics of real time operating systems.
Note down the complete command line to perform following task in UNIX shell. Write a bash script that displays its name and checks for existence of a file. If the file exists it will display a messag
Draw and describe the basic Linux file system organization. Draw and describe the basic Linux Kernel components. Describe the following with respect to Linux OS.
Why is the phase of Lexical analysis important? Why is input buffering important in Lexical Analysis? Describe all the phases of compilers in detail.
What are the different issues related to disk performance? Describe any one disk scheduling algorithm with appropriate example. What are the advantages and disadvantages of C-SCAN scheduling algorithm
What features of assembly language makes it mandatory to design a two pass assembler? Describe with appropriate example. Draw a neat flowchart for macroprocessor to handle nested macro definitions.
Explain about the evolution of operating systems from mainframe batch systems to mainframe time sharing systems.
Explain the Multics operating system project which was under taken at MIT in the year 1960. Identify any impacts and influences Multics has had on modern day trends in developing secure and trusted
Describe how jacketing could minimize some of the issues of User Level threads. Make a distinction between the controls problems of deadlock and starvation.
Implementing Group Policies in a Windows environment simplify largely the tasks of Systems Administrators. In this context, describe the use of Group Policies and explain four tasks that can be atta