0% found this document useful (0 votes)
40 views2 pages

Operating System 2nd Internal

operating system
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views2 pages

Operating System 2nd Internal

operating system
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 2

Prince Dr. K.

Vasudevan College of Engineering and Technology


CSE(C INTERNAL ASSESSMENT II
Branch: Max. Marks: 100
YBER) May-2024

Year/
II/IV CB 3402 OPERATING SYSTEM AND SECURITY Duration: 3 hrs
Semester:

COURSE OUTCOMES :
CO1 : Understand the basic concepts of Operating Systems.

CO2 : Explore the process management concepts including scheduling, synchronization, threads and deadlock
CO3 : Understand the memory, file and I/O management activities of OS
CO4 : Understand the requirements of a trust model.
CO5 : Learn how security is implemented in various operating systems.

K1:REMEMBER K2:UNDERSTAND K3:APPLY K4:ANALYZE K5:EVALUATE K6:CREATE

Answer ALL Questions

T.Dhivya PART – A 10 x 2 = 20 CO K YEAR

Answer all Questions


1 What is demand paging? CO-3 K-1
2 What is TLB? What are the uses? CO-3 K-1
3 What are the advantages and disadvantages of single contiguous memory allocation? CO-3 K-1

4 What is address binding? CO-3 K-1

5 What is meant by page fault? CO-3 K-1

6 What is the goal of secure operating system? CO-4 K-1


CO-4 K-1
7 What is meant by trust model.

8 Define protection system. CO-4 K-1

9 Explain reference monitor. CO-4 K-4

10 Define mandatory protection system. CO-4 K-1

PART – B 5X13=65
Explain in details about contiguous memory allocation with neat diagram. 13
11 a. CO-3 K-2
OR
Discuss segmentation in detail. Compare it with paging.
b. 13 CO-3 K-2

Explain various file allocation methods in detail.


12 a. 13 CO-3 K-1

OR
i)Explain the various structures of directories in detail. 13
b. ii)Write briefly about file attributes, operations, types and structures. CO-3 K-2

Consider the following page strings


2,3,4,5,3,2,6,7,3,2,3,4,1,7,1,4,3,2,3,4,7
Calculate the number of page faults would occur the following page
replacement algorithm with frame size of 3 and 5. 13
13 a. CO-3 K-5
i)LRU
ii)FIFO
iii)Optimal

OR
The requested tracks in the order received are:
98,183,37,122,14,124,65,67.
Apply the following disk scheduling algorithms. Strating track at 53.
b. i)FCFS 13 CO-3 K-5
ii)SSTF
iii)SCAN
iv)C-SCAN
14 a. Explain trust model and thread model 13 CO-4 K-2
OR
Explain BIBA integrity model and BELL-LAPADULA model
b. 13 CO-4 K-2

Explain DENNING’s LATTICE model


15 a. 13 CO-4 K-2

OR
Explain Reference monitor in detail.
b. 13 CO-4 K-2
PART – C 1 X 15=15
Explain CLARK WILSON integrity model and LOW -WATERMARK CO-4
16 a. integrity model 15 K-2

OR

Explain Lampson’s access matrix and Mandatory protection system


b. 15 CO-4 K-2

You might also like