III-B.Tech. II-Semester Supplementary Examination December 2002/January 2003
b) c)
.in
1.a)
COMPUTER OPERATING SYSTEMS (Electronics and Communication Engineering) Time:3 hours Max.Marks:70 Answer any Five questions All questions carry equal Marks --What is spooling? Explain how spooling improves the performance of a computer system? What is virtual machine? Explain JAVA virtual machine. Explain different file access methods. Explain the concept of process with the help of process state diagram. Explain Process Control Block (PCB). Explain different types of process schedulers used in operating systems.
3.a) b) c)
Explain different types of address bindings. Explain Multilevel paging. Given memory partitions of 100k, 500k,200k,300k and 600k (in order), how would each of the first-fit, Best-fit, and worst-fit algorithms place processes of 212k, 417k, 112k and 426k (in order)?
4.
Discuss the following page replacement algorithms: a) First-in-First-out algorithm b) Least recently used algorithm c) Counting algorithm.
5.a) b) c)
What is dead lock? Discuss the conditions required for the dead lock to occur. Discuss the dead lock prevention methods. Differentiate the safe and unsafe state. Show how a system moves to deadlock state from unsafe state with an example.
nt
uW
or ld
2.a) b) c)
6.a)
b)
Show that, if the wait and signal operations are not executed atomically, then mutual exclusion may be violated. Discuss the timestamp-based protocol for concurrent atomic transactions. Differentiate protection and security. Explain how protection is implemented using Access Matrix. Describe various types of Threats for a computer system.
8.
Write short notes on the following: a) Parallel systems (b) Monitors (c) Process communication. *** *** ***
mutual exclusion may be violated. b) Discuss the timestamp-based protocol for concurrent atomic transactions. 7.a) Differentiate protection and security.
W/mk] followed by a 25mm layer of fiber-glass insulation [k=0.048 W/mk]. ... boundary layer thickness in the heat transfer over a flat plate tested over its entire ...
c) Determine the symmetrical components of currents in the following circuit · (contdâ¦3) · AjntuWorld. ... a) Synchronous phase modifiery · b) Insulating materials.
b) Compare between computer system and PLC. 2. a) Define ... 7. a) Explain the concept of a computer network and discuss the requirement of · networks used ...
Explain the following top-down parsing methods with example. a) Recursive-Descent parsing · b) Predictive parser · 5.a) Explain about the specification of a ...
system? Explain briefly about the various instructions used and also the possible · variations in each ... d) Storage mechanism and (e)Data transfer rate. ... b) Explain the direct memory access (DMA) mechanism of transfer of date between.
b) Explain the operation of Token ring method. 4.a) What are bridges? What key factors are considered while designing the · bridges. b) Explain the operation of ...
b) State and prove Chebyshev's inequality. 4. A population consists of the five numbers 2,3,6,8,11. Consider all possible · samples of size two which can be ...
signed 16-bit numbers. n xi · 2 · b) Write an 8086 assembly language program to compute Σ ------ · i=1 n · where xi is represented in 16-bits. 4.a) List and ...
uncertainity was high and the search for alternatives is randomized in natureâ. Explain how the simulation modelling technique with a man-machine interaction.
b) Add power amplifying pilot and negative feed back to the above. Explain the ... b) Stability of exothermic chemical reactor. c) Nuclear power plant operations.
Code No: 320452. III-B.Tech II-Semester Supplementary Examination December2002/January 2003 · LINEAR DIGITAL I.C.APPLICATIONS · (Common to Electronics and Communication Engineering, · Electronics and Control Engineering, Electronics Instrumentation ·
Describe the manufacturing process of paper with a neat flow diagram. 4. a) Distinguish between Oils and ... Toilet Soaps · (c) · Vinyl Chloride (e) · Nylon - 6,6 (f).
ARTIFICIAL INTELLIGENCE · (Computer Science ... Every dog has bitten a mail carrier (ii) Every dog has bitten every mail · carrier. b) Explain the six ...
articular cartilage surfaces. 7.a) With the help of a P-V curve of a lung, explain the normal breathing mechanism. b) What are the lung mechanical parameters.
Explain in detail about the instruments used for open heart surgery. 5. Explain in detail about different pre-operative procedures to be performed for · a subject.
Draw and explain the three layer networks that emulates the 'XOR' function. ... Hopfield network could be used to perform error correction, although in fact, it is.
b) You are asked to conduct an energy audit of a foundry industry located in · Hyderabad. Explain how you would conduct the energy audit, in a chronological.
Solved Paper - Kerala Artisans Development Corporati ... 6.03.2017 - Question Code-A (Online Examination).pdf. Solved Paper - Kerala Artisans Development ...