Code No: 07A60501
R07
Set No. 2
1. (a) Explain the flaws in one-way encryption of password strategy. (b) Write a brief note on intrusion detection.
[8+4+4]
2. Explain the following allocation algorithms: (a) First fit (b) Best fit
[5+5+6]
or
(c) Worst fit.
ld .
(c) Write about intruders.
in
III B.Tech II Semester Regular/Supplementary Examinations,May 2010 Operating Systems Computer Science And Engineering Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks ?????
3. What is a semaphore? Explain its usage in readers - writers problem. [16]
P0 P1 P2 P3 P4
uW
4. Consider the following snapshot of a system. Answer the following questions using the bankers algorithm.
Allocation A B C D Max A B C D Available A B C D 0012 0012 1520 1000 1750 1354 2356 0632 0652 0014 0656
nt
(a) What is the content of matrix need?
(b) Is the system in a safe state?
Aj
(c) If a request from process P1 arrives for (0, 4, 2,0 ) can the request be granted immediately? [16]
5. (a) Discuss shortest-process-next scheduling with an example. (b) Describe various short-term scheduling policies.
[8+8]
6. (a) What are pre-allocation, dynamic allocation, partition size with respect to secondary storage management? (b) Describe various file allocation methods briefly.
[8+8]
7. Discuss the reasons why operating system might require accurate information on how blocks are stored on a disk. How can the OS improve the performance of the file system with this knowledge? [16] 1
Code No: 07A60501
R07
Set No. 2
8.(a) List out the various functions of operating system. (b)Explain how protection is different from security. [8+8]
Aj
nt
uW
or
ld .
in
?????
2
Code No: 07A60501
R07
Set No. 4
in
III B.Tech II Semester Regular/Supplementary Examinations,May 2010 Operating Systems Computer Science And Engineering Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks ????? 1. Explain about the following:
ld .
(a) Process Control block. (b) Task switching.
[8+8]
2. Describe the physical structure of Magnetic Disks and Magnetic Tapes with its merits and demerits. [16]
(a) Viruses (b) Worms (c) Logic bomb
uW
(d) Trap door.
or
3. Write short notes on the following:
[4+4+4+4]
4. (a) Explain the monitor solution to the Dining philosopher problem (b) Define Bounded Buffer problem.
[12+4]
5. Explain system components of operating system. 6. Explain File allocation method in unix.
[16] [8+8]
nt
7. Briefly explain about deadlock prevention methods with examples of each.
[16]
Aj
8. Consider the following page reference string: 1,2,3,4,2,1,5,6,2,1,2,3,7,6,3,2,1,2,3,6. How many page faults would occur for the filling replacement algorithms, assuming three or five,frames?Initiallyallframesare empty,so the first unique pages will also cost one fault each. LRU replacement FIFO replacement Optimal replacement Second chance replacement. [16] ?????
3
Code No: 07A60501
R07
Set No. 1
in
III B.Tech II Semester Regular/Supplementary Examinations,May 2010 Operating Systems Computer Science And Engineering Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks ????? 1. Write short notes on: (a) Monitor (b)starvation.
ld .
[8+8]
2. What are the services that are provided by the kernel related to I/O? Write about the kernel I/O subsystem in detail. [6+10] 3. Explain various Disk scheduling algorithms with an example.
[16]
or
4. (a) Explain the differences between user-level threads and kernel-level threads.
(b) Describe the single-blocked queue and multiple-blocked queues with an example. [8+8] 5. (a) Explain the various password selection strategies.
uW
(b) Discuss about UNIX password scheme.
[8+8]
6. Write short notes on: (a) Sequential file (b) Indexed file
(c) Indexed sequential file
[4+4+4+4]
nt
(d) Direct file.
7. (a) What is the relationship between FIFO and clock page replacement algorithm?
Aj
(b) What is the difference between resident set management and page replacement policy? [8+8]
8. How security and protection services are managed by an OS? What is the main purpose of system call and system program. [16] ?????
4
R07
Code No: 07A60501
Set No. 3
in
III B.Tech II Semester Regular/Supplementary Examinations,May 2010 Operating Systems Computer Science And Engineering Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks ????? 1. Explain the following terms:
ld .
(a) First fit. (b) Best fit. (c) Worst fit. (d) Fixed partitioning.
[4+4+4+4]
2. (a) Discuss the objectives for a file management system.
or
(b) Illustrate with a neat diagram about the various elements of a file management system. (c) What do you understand by a file directory?
[4+8+4]
3. (a) Explain the role of process control block in operating systems.
uW
(b) Explain the general structure of operating system control tables with an example. [8+8] 4. Discuss about synchronization provided in windows OS?
[16]
5. Consider the following snapshot of a system: Processes
Max Available A B CD A B CD 0012 2100 2750 6656 4356 0652
Aj
nt
P0 P1 P2 P3 P4
Allocation A B CD 0012 2000 0034 2345 0332
Answer the following questions using the banker’s algorithm: (a) What is the content of the matrix Need?
(b) Is the system in a safe state? Why? (c) Is the system currently deadlocked? Why or why not?
(d) Which process, if any, or may become deadlocked if this whole request is granted immediately? [4+4+4+4] 6. What are the various RAID levels? Explain them briefly. 5
[16]
Code No: 07A60501
R07
Set No. 3
7. (a) How does the principle of least privilege aid in the creation of protection systems? Explain. (b) How can systems that implement the principle of least privilege still have protection failures that lead to security violations? Explain. [8+8]
in
8. Hpw does the distinction between monitor mode and user mode functions as a rudimentary from protection system. [16]
Aj
nt
uW
or
ld .
?????
6