Operating Systems Jan 2023
Operating Systems Jan 2023
|''|'||||''|'''|||'|
Code No: R2031422 R20 SET - 1
2 of 2
|''|'||||''|'''|||'|
Code No: R2031422
R2031011
R2031421 R20 SET - 2
UNIT-I
1. a) What is an Operating System? Briefly discuss its functions and [7M]
types.
b) Explain the different types of System calls in OS. [7M]
(OR)
2. a) Explain the major activities of Operating System in connection [7M]
with process and memory management.
b) Write the steps of Booting process in Operating System and [7M]
discuss is types.
UNIT-II
3. a) Explain the role of Process Control Block in Operating System [4M]
and describe its attributes.
b) Write the important characteristics of Round Robin Scheduling [10M]
algorithm. And illustrate its performance by drawing Gantt chart
for the following workload in a system. ( Assume time quantum =
3 units)
(OR)
4. a) State the Dining philosopher’s problem. How Semaphores can be [10M]
used to provide a solution to Dining philosopher’s problem?
Explain.
b) Explain the Message passing model of Inter-process [4M]
communication.
UNIT-III
5. a) How does fragmentation occur in contiguous memory allocation? [7M]
Explain with an example.
b) Explain the working of Demand Paging technique. And name the [7M]
hardware required to support demand paging.
(OR)
1 of 2
|''|'||||''|'''|||'|
Code No: R2031422 R20 SET - 2
6. a) A system uses 3 page frames for storing process pages in main [7M]
memory. It uses the Least Recently Used replacement policy.
Assume that all the page frames are initially empty. What is the
total number of page faults that will occur while processing the
page reference string given below?
1,2,3,4,2,1,5,6,2,1,2,3,7,6,3,2,1,2,3,6
Also calculate the hit ratio and miss ratio
b) What is Thrashing? What is the cause of Thrashing? How does [7M]
the system detect Thrashing? What can the system do to
eliminate this problem?
UNIT-IV
7. a) Why Ostrich algorithm is considered the best solution for [7M]
deadlock handling? Explain the Ostrich algorithm.
b) Explain the following [7M]
i)File System implementation
ii)Stable storage implementation
(OR)
8. a) Discuss the different ways of aborting a process in order to [7M]
eliminate deadlocks.
b) Suppose the following disk request sequence (track numbers) for [7M]
a disk with 200 tracks is given: 82,170,43,140,24,16,190.
Assume that the initial position of the R/W head is on track 50.
Calculate the Seek Time for SSTF, SCAN, LOOK
UNIT-V
9. a) Discuss various System threats endangering the security of a [7M]
system.
b) Explain the core components of Linux operating system. [7M]
(OR)
10. a) What is a Firewall and how does it protect Systems and [7M]
Networks?
b) Discuss the types of Access and Access controls in Operating [7M]
System.
2 of 2
|''|'||||''|'''|||'|
Code No: R2031422 R20 SET - 3
UNIT-IV
7. a) Explain and compare the FCFS and SSTF disk scheduling [7M]
algorithms.
b) Discuss the different levels of RAID configuration. [7M]
(OR)
8. Consider a system that contains five processes P1, P2, P3, P4, [14M]
P5 and the three resource types A, B and C. Following are the
resources types: A has 10, B has 5 and the resource type C has
7 instances.
Proc Allocation Max Available
ess A B C A B C A B C
P1 0 1 0 7 5 3 3 3 2
P2 2 0 0 3 2 2
P3 3 0 2 9 0 2
P4 2 1 1 2 2 2
P5 0 0 2 4 3 3
Answer the following questions using the banker's algorithm:
1. What is the reference of the need matrix?
2. Determine if the system is safe or not.
3. What will happen if the resource request (1, 0, 0) for
process P1 can the system accept this request
immediately?
UNIT-V
9. a) What are the goals of System Security? Describe various threats [7M]
to the operating system.
b) What does the Access control matrix represent? Explain the [7M]
implementation of Access control matrix.
(OR)
10. a) How is Cryptography used for System Security and [7M]
Authentication?
b) What are the features of firewall? How firewall protect the [7M]
System or Network?
2 of 2
|''|'||||''|'''|||'|
Code No: R2031422
R2031421 R20 SET - 4
|''|'||||''|'''|||'|
Code No: R2031422 R20 SET - 4
2 of 2
|''|'||||''|'''|||'|