Question Paper: Bms College of Engineering
Question Paper: Bms College of Engineering
Autonomous Institute Affiliated to VTU December 2019 / January 2020 Semester End Main Examinations
Operating Systems [19CS4PCOPS]
Marks: 100 Duration: 210 mins.
CSE, Sem:IV
Answer all the questions.
Instructions:
1. Answer FIVE full questions using the given internal choice
2. Missing data, if any, may be suitably assumed
1) Elaborate on the two viewpoints from which the role of the Operating System can be better understood. (6)
a)
b) Differentiate between traps and interrupts. Illustrate how they are used to ensure proper execution of the Operating System in dual-mode (8)
and multi-mode operation.
c) Message-passing systems of IPC require links for processes to communicate. Discuss the issue of addressing while logically implementing (6)
such links for SEND and RECEIVE operations.
2) Define Multithreading. List and explain any four benefits of Multithreaded programming. (5)
a)
b) (10)
Page #1
c) (5)
3) (5)
a)
b) (5)
Page #2
c) (10)
4) Illustrate with an example, the problem of internal and external fragmentation encountered in contiguous memory allocation. (6)
a)
b) A demand paging system takes 100 time units to service a page fault and 300 time units to replace a dirty page. Memory access time is 1 (6)
time unit. The probability of a page fault is p. In case of a page fault, the probability of page being dirty is also p. It is observed that the
average access time is 3 time units. Find the value of p.
c) Trashing results in performance problems. Illustrate the phenomena and deduce the two methods of handling the effects due to trashing. (8)
[OR] Justify the need for Translation Look-aside Buffer (TLB) in paging? (10)
5) Explain TLB in detail as a part of paging system hardware along with a neat diagram
a)
b) (6)
c) (4)
6) (10)
a)
b) (10)
[OR] Define Free Space List. With suitable examples, explain any three methods of free space list implementation. (8)
7)
a)
b) Differentiate between Host-Attached Storage and Network-Attached Storage. (4)
c) Illustrate the Access Matrix method of system protection. (8)
-----End-----
Page #3