Fundamentals of Operating Systems 2015

Size: px
Start display at page:

Download "Fundamentals of Operating Systems 2015"

Transcription

1 Unit : 1 Introduction of Operating Systems, File Systems and Management Short Questions:- 1. What act as an intermediary between User and Hardware of Computer? Define it. 2. What is the significance of Operating System? 3. List out resources that are managed through the management functions provided within an OS. 4. List of any three examples of Operating System. 5. Define the term memory with reference to Volatility characteristic. 6. What is Non-volatile Memory? 7. Give name of three I/O devices. 8. Define the term interrupt. 9. What process is carried out in interrupt mode of data transfer? 10. What is the purpose of DMA mode at the time of data transfer? 11. State two stages of DMA mode of data transfer. 12. Define Mutual Exclusion. 13. What is Client and Server machine? 14. Define Shell of an OS. 15. Define core component of an OS. 16. Give full form of HCI. 17. Define file. 18. What is file system? 19. What is Compaction? 20. Define file descriptor. 21. List various attributes of file. 22. List any four file type along with their extension. 23. List out operations that can be carried out on file. 24. Which is the UNIX command use to list files from the directory? 25. What is the importance of Inode in UNIX? 26. What information is obtained after the execution of ls-l command? 27. What do you understand by mutual exclusion? 28. State the full form of IPC. 29. What is use to encrypt file in UNIX operating system? Give its name and syntax. 30. Give full form of FCB. 31. State the usage of FCB. 32. State any two flash memory commands Long Questions:- 1. Explain Real Time Control Application. 2. Why we need Operating System? Explain it with reference to the responsibilities of Operating System. 3. Give overview of Operating System by considering modern computer for managing primary resources. 4. Explain how does services provided by an operating system are used efficiently. 5. Discuss various file attributes. 6. Explain various file types. 7. Explain operations that can be performed on file. 8. Describe various file access permissions. 9. Write a short note on file access with its command and security concerns. 10. Explain the structure used to manage all information of file in UNIX operating system. 11. Explain root file system. Mr. Hardik Vyas Page 1

2 12. Explain file organization that manages data transfer in terms of blocks. 13. When does fragmentation takes place? Explain its types. 14. State the concept of FCB. 15. Write short note on disk partitions. 16. Describe flash memory. 17. Write a note on Portable storage. 18. Discuss various commands along with its usage that can be used to manage flash memory. 19. Explain allocation methods that are to be considered for file storage management. Fill in the blanks:- 1. We need to provide that software layer in a computer system which schedules all the operations and manages all the computing. 2. The software layer, nearest to hardware, which facilitates launching all the other software utilities and applications, is called. 3. The Operating System ensures each user gets sufficient. 4. A computer executes programs and access data from its main memory, also called. 5. The helps to manage movement of information between different levels of memory as well as from and to I/O devices. 6. is also known as volatile memory and is also known as non-volatile memory. 7. A user usually maintains a large amount of information on bulk storage i.e. and uses OS commands to bring in or move out information. 8. The system uses at an intermediate level of storage technology. 9. User interaction with the system takes place through. 10. Mode of data transfer is used wherever a user, or a critical application, requires immediate attention where as mode of data transfer is used bulk transfer of information. 11. Operating System service routines are resident in a which cannot be directly accessed by a user program or by an application. 12. UNIX user operates in environment. 13. is concern with the selection mechanism which allows a user to choose from among the possibilities such as to open a file, to store or trash. 14. The interprets the Operating System commands and elicits OS services by communicating with the Kernel. 15. Interprocess communication forms the primary basis for. 16. The program in execution is regarded as a. 17. The machine that seeks the services from other is called and the machine that offers the services to other is called. 18. is the general-purpose utilities provided by OS that helps us to think in terms of higher level of operations. 19. is software which empowers users and applications to organize and manage their file. 20. is kept within a file structure and is used by the file system software to help OS to provide management services. 21. A as a layer of software provides a logical view of files to user or to an application. 22. The files are stored in secondary storage which provides view of the file. 23. The owner of the file can alter the permissions using command of UNIX. 24. File of the system indicates who accessed when and did what. 25. are the most elementary and constitute a fairly effective form of security measure in a standalone single-user system. 26. offers all the information about access rights, file size, its date of creation, usage, Mr. Hardik Vyas Page 2

3 and modification. 27. allows better management of the disk space. 28. memory can be used as an extension to secondary memory. 29. The cell is capable of storing bit information. State True or False:- 1. Operating system is a software layer nearest to hardware, which facilities launching of other software utilities and application. 2. The primary resources that one can identify are only memory and I/O devices. 3. Processor time needs to be used by every running application. 4. Secondary storage comes under the Volatile type of memory. 5. Caching is done between Registers and secondary memory. 6. The interrupt mode of data transfer is used for bulk data transfer. 7. OS services are sought by the user via a command interpreter provided by a shell around kernel. 8. HCI provides user the interface through which they can perform various operations in very easy manner. 9. Server is the machine that seeks services from other machines. 10. The utilities supported by an Operating System make it possible to execute a sequence of instructions stored in a device driver. 11. Shell protects the system service routines. 12. A program in execution is known as thread. 13. UNIX recognizes only three categories of users: Owner, Group and others. 14. UNIX provides Crypt command to decrypt the files. 15. Flash memory is also used as physically portable memory. 16. The command CE: Chip enable for flash memory. 17. The command ADE: Address latch enable. 18. MTD stands Memory Technology Device. Multiple Choice Questions:- 1. Which of the following is the software layer nearest to the hardware? A. Operating System B. Application Software C. Compiler D. Loader 2. Operating System is responsible for A. Providing resources that are required by the user or applications B. Providing initial set-ups C. Services that is required for the communication over the network. D. All of the above 3. Operating System schedules the operations in order. A. Input, Data, Output B. Input, Output, Data C. Data, Input, Output D. Data, Output, Input 4. Operating System ensures that all users get sufficient A. Processor time B. Throughput C. Turnaround time D. Response time Mr. Hardik Vyas Page 3

4 5. Operating System records the that leads to the error condition. A. Parallel events B. Event handler C. Sequence of events D. None of the above 6. Which of the following is increased by having intermediate storage that can absorb different rates or timing of Input and output? A. Processor time B. Throughput C. Turnaround time D. Response time 7. When we turn off the computer, the data from which of the following is lost? A. Non-Volatile Memory B. Volatile Memory C. All of the above D. None of the above 8. Which of the following memory is at the intermediate level of technology? A. Main memory B. Secondary memory C. Registers D. Cache 9. Which of the following is used for User interaction with the system? A. Connection B. I/O devices C. Internet D. Computer 10. Instructions stored in which of the following can be executed by utilities supported by Operating System? A. DMA B. Device Controller C. Device Driver D. registers 11. In which of the following OS service routines are resident? A. Shell B. Kernel C. Main memory D. Cache 12. Which software allows users and applications to organize their files? A. Compiler B. Interpreter C. Loader D. File System 13. The setup stage of DMA mode indicates data will be transfer and it may be located. A. How much, where B. When and where C. What and why D. What and when 14. Three categories of user of file are. Mr. Hardik Vyas Page 4

5 A. Owner, group, Other B. User, Owner, Other C. User, group, Other D. Owner, group, user 15. Ls command lists and. A. Files and subdirectories B. Files and folders C. Directories and subdirectories D. Directories and folders 16. are the most elementary and constitute a fairly effective form of security measure in a standalone single-user system. A. Access permission B. Access C. Rights D. Demand 17. offers all the information about access rights, file size, its date of creation, usage, and modification. A. Inode B. Index C. Table D. File 18. A user may use his own to encrypt his file when an enhanced level of security is provided for important files. A. Encryption key B. Secret password C. Decryption key D. Master key 19. Subdirectory sbin contains for system use. A. Codes B. Binaries C. Libraries D. Variable data 20. Which of the following is the MS DOS equivalent command for mv command of UNIX? A. Rename B. Copy C. Mkdir D. Move 21. Which of the following command is used to encrypt the files in UNIX? A. Encrypt B. Crypt C. Decrypt D. None of the above 22. Which of the following are the types of files supported by UNIX? A. Directory B. Special C. Named D. All of the above 23. Which of the following subdirectory of Root file system contains shareable binaries in UNIX? A. Sbin Mr. Hardik Vyas Page 5

6 B. Lib C. Usr D. Etc 24. Which of the following is Command latch enable command for flash memory pins? A. CE B. CLE C. CDE D. CL Unit : 2 Process and Process Management Short Questions :- 1. Define following terms: a. Process b. Program c. Multi-programming operating system. d. Time-sharing operating system e. Response time f. Waiting time g. Throughput h. Turnaround time i. Processor utilization j. Degree of multi-programming k. CPU burst l. Paging m. Priority n. Short term schedulers o. Long term schedulers. p. Medium term schedulers. 2. What is the purpose of index register? 3. When the system is known as real-time system? 4. List out the terms to be considered within performance evaluation. 5. List out various states of process. 6. Which tasks are performed by OS when the process is created? 7. How identify is given to the process by the OS? 8. What do you understand by Process Control Block (PCB)? 9. What is time slice? 10. What is the significance of Dispatcher? 11. When is a process said to be in ready-to-run state? 12. When process is marked as blocked for IO? 13. What is starvation? 14. What do you understand by scheduling? 15. What is the purpose of scheduler? 16. List out types of scheduler. 17. Which type of scheduler controls the degree of multiprogramming? 18. What do you mean by preemptive scheduling and non-preemptive scheduling? 19. What is batch processing? 20. What is the pitfall of FCFS algorithm? 21. What do you mean by priority in priority scheduling algorithm? Mr. Hardik Vyas Page 6

7 22. What is the solution for indefinite blocking in priority scheduling algorithm? 23. What is meant by context switching? 24. What is the purpose of exponential averaging? 25. On which factor, performance is dependent in Round robin scheduling algorithm? 26. When is process in zombie state in UNIX operating system? 27. Give the command to obtain the information about in UNIX operating system. Long Questions :- 1. Explain the terms process and program with an example 2. Write a note on Multiprogramming Operating System and Time Sharing Operating System. 3. Discuss process states in detail with diagram. 4. Write a short note on Queuing Model. 5. Give difference between the following:- a) Process and Program. b) Ready state and running state. c) Preemptive scheduling and Non-preemptive scheduling. d) Long term scheduler and Short term scheduler. e) CPU bound processes and IO bound processes. 6. Explain with example different types of scheduling policies. 7. How to estimate completion time? 8. Which tasks are carried out when context switching occurs? 9. Write a note on exponential averaging technique. 10. Which are the situations considered for processor scheduling? 11. Describe UNIX process state information. 12. Explain with example First Come First Served scheduling algorithm with non-preemption policy 13. Discuss Shortest Job First scheduling algorithm with non preemption policy. 14. Write short note on Priority scheduling algorithm. 15. Describe Round Robin algorithm with example 16. Explain with example Shortest Remaining Time First scheduling algorithm. 17. Suppose a new process in a system arrives at an average of six processes per minute and each such process requires an average of 8 seconds of service time. Estimate the fraction of time the CPU is busy in a system with a single processor. 18. What are the factors that need to be considered to determine the degree of multiprogramming in a system? Mr. Hardik Vyas Page 7

8 Algorithm Questions :- 1. Assume you have the following jobs to execute with one processor, with the jobs arriving in the order listed here. Use FCFS, SJF and Priority non-pre-emptive scheduling algorithm. Processes Execution Priority Time(milliseconds) P P P P P a) Create a Gantt (timeline) chart illustrating the execution of these processes? b) What is the average turnaround time (time of execution) for the processes? c) What is the average waiting time for the processes? 2. Assume you have the following jobs to execute with one processor, with the jobs arriving in the order listed here. Use FCFS, SJF and Priority non-pre-emptive scheduling algorithm. Processes Execution Priority Time(milliseconds) P P P P P5 5 3 a) Create a Gantt (timeline) chart illustrating the execution of these processes? b) What is the average turnaround time (time of execution) for the processes? c) What is the average waiting time for the processes? 3. Assume you have the following jobs to execute with one processor, with the jobs arriving in the order listed here. Use FCFS, SJF and Priority non-pre-emptive scheduling algorithm. Processes Execution Priority Time(milliseconds) P P P P P5 4 3 a) Create a Gantt (timeline) chart illustrating the execution of these processes? b) What is the average turnaround time (time of execution) for the processes? c) What is the average waiting time for the processes? 4. Assume you have the following jobs to execute with one processor, with the jobs arriving in the order listed here. Use FCFS, SJF and Priority non-pre-emptive scheduling algorithm. Processes Execution Priority Time(milliseconds) P P P P P a) Create a Gantt (timeline) chart illustrating the execution of these processes? b) What is the average turnaround time (time of execution) for the processes? Mr. Hardik Vyas Page 8

9 c) What is the average waiting time for the processes? 5. Assume you have the following jobs to execute with one processor, with the jobs arriving in the order listed here. Use Round Robin pre-emptive scheduling algorithm. Time slice is taken as 10 milliseconds. Processes Execution Time(milliseconds) P1 20 P2 10 P3 25 P4 15 P5 5 a) Create a Gantt (timeline) chart illustrating the execution of these processes? b) What is the average turnaround time (time of execution) for the processes? c) What is the average waiting time for the processes? 6. Assume you have the following jobs to execute with one processor, with the jobs arriving in the order listed here. Use Round Robin pre-emptive scheduling algorithm. Time slice is taken as 4 milliseconds. Processes Execution Time(milliseconds) P1 10 P2 25 P3 17 P4 3 P5 12 a) Create a Gantt (timeline) chart illustrating the execution of these processes? b) What is the average turnaround time (time of execution) for the processes? c) What is the average waiting time for the processes? 7. Assume you have the following jobs to execute with one processor, with the jobs arriving in the order listed here. Use Round Robin pre-emptive scheduling algorithm. Time slice is taken 10 milliseconds. Processes Execution Time(milliseconds) P1 20 P2 10 P3 25 P4 15 P5 5 a) Create a Gantt (timeline) chart illustrating the execution of these processes? b) What is the average turnaround time (time of execution) for the processes? c) What is the average waiting time for the processes? Mr. Hardik Vyas Page 9

10 Fill in the blanks :- 1. is a passive text script where as is a program in execution. 2. OS allows and manages several programs to be simultaneously resident in main memory. 3. When the resident programs in a multi-programming environment belong to different users then it is OS. 4. computing requires that, to execute program it must be resident in. 5. Having just single program in main memory may result in gross of the processor. 6. For a system to be time sharing, it must support. 7. The greater is the utilization of processor; the is the information is processed. 8. If the system responds in reasonably time, then the user would not even aware of the presence of other users and the services rendered to them. 9. is the time interval which spans the time from when the last character has been input to the time when the first character of the output appears. 10. When processor is engaged by the process, it is said to be in state. 11. When process is waiting for IO to be completed it is considered in state. 12. When a process terminates then it moves to state. 13. A process can be scheduled by the OS to execute. 14. The process marked as can be scheduled to run. 15. Sometimes the process is not able proceed till it gets signals. 16. plays an important role in the management of the process. 17. is like Denial of Services. 18. The operating system has program which chooses one of the ready-to-run processes and assign it to the processor. 19. The maximum delay of lower priority process when the higher priority process begin to populate the system. 20. The operating system estimate the processing time for the process by monitoring a process s estimate and activity. 21. formula for exponential averaging. 22. The process of moving processes in and out of main memory to disk is called. 23. The process context area is also called. 24. OS performance tuning is done by making a choice of a scheduling policy which enhances the. 25. policy consideration influences immediate productivity concerns. State true or false: 1. Process is a live mechanism that is passive where as program is an active. 2. When several programs are managed and resident simultaneously in memory it is called Time sharing OS. 3. The system where the resources are shared by many users is called Time Sharing System. 4. The processor manages all the migration of the processes between the process states. 5. The process data structure records the state of the process. 6. The OS is not able to allocate time slots to run the process. 7. Scheduling policy selection criteria indicate that the measures for processor utilization and throughput are user-centered requirements. 8. When processes are scheduled according to the importance of the process is called priority based scheduling. 9. In non-preemptive operations, the process is suspended to attend interrupt or the process Mr. Hardik Vyas Page 10

11 has consumed its allocated time slot. 10. The process of moving process in and out of main memory is called swapping. 11. Scheduling policy selection criteria indicate that the measures for response time and turnaround are system-centered requirements. 12. A long term policy consideration influences immediate productivity concerns. 13. The processes that are in secondary memory and not loaded yet would be in long-term concerns. 14. In UNIX all the processes are created by a parent process by issuing a system call. 15. The OS monitors the progress of every process during its lifetime. Multiple Choice Questions :- 1. Which of the following is the central and key element of the computer system? A. Processor B. Secondary device C. Keyboard D. mouse 2. Which of the following is enhanced, when multiple programs are resident in memory? A. Throughput B. Memory utilization C. Response time D. Waiting time 3. When process is having all the resources except processor then it is considered in which of the following state? A. Wait B. Ready-to-run C. Exit D. New 4. Which of the following expression provides CPU utilization, if the waiting time for a process is p and there are n processes in the memory? A. p / n B. p ^ n (p raised to n) C. 1 p ^ n D. n ( p ^ n) 5. When a program is in execution it is called A. action B. task C. process D. activity 6. Which of the following term is given to the time interval which spans the time from when the last character has been input to the time when the first character of the output appears? A. Waiting time B. Turnaround time C. Response time D. Throughput 7. A process is which of the following type of entity. A. active B. passive C. moral D. blocked 8. When the process is loaded in the memory it is in which of the following queue? Mr. Hardik Vyas Page 11

12 A. device B. ready C. job D. circular 9. Which of the following is called the process context area? A. Process control block B. Process state C. Program counter D. Processor time 10. Which of the following manages all the migrations between process states? A. Processor B. Dispatcher C. Operating system D. IO 11. Which of the following data structure is maintained by OS to manage the process? A. Stack B. Link list C. Tree D. Queue 12. In round robin algorithm, which of the following type of value (q) for time slice creates overhead of context switching? A. large B. small C. regular D. moderate 13. Which of the following term is used for the technique of moving the process in and out of memory? A. Connection B. swapping C. switching D. shifting 14. In exponential averaging technique, which of the following value of alpha ignore the past history? A. 1 B. 0 C. maximum D. minimum 15. Up till which of the following the operating system monitors the overall progress of process? A. lifetime B. lifeline C. deadline D. response time 16. Which of the following scheduler implement the technique of swapping? A. Short term B. Long term C. Medium term D. Coarse term 17. Which of the following is the alias name of the short term scheduler? A. CPU Mr. Hardik Vyas Page 12

13 B. Job C. Strict D. Routine 18. Which of the following scheduling allows a higher priority process to replace a currently running process even if it s time slice is not over or it has not requested for any IO? A. Pre-emptive B. Non-pre-emptive C. Distinctive D. Supportive 19. A process is said to be in which of the following state when it is waiting for IO to be completed. A. Wait B. Ready C. Run D. exit 20. Which of the following instruction address is stored by the program counter element of PCB? A. Next B. First C. Last D. previous Short Questions :- 1. Define the following terms : a) Compile time b) Load time c) Execution time d) Page e) Page-fault f) frame g) Paging h) Page-table i) Frame j) Segment k) Segmentation l) Locality of reference m) Fragmentation n) Garbage Collection o) Compaction p) Swapping q) Virtual Memory r) Logical Address s) Physical Address t) Overlay u) Thrashing v) TLB w) Compile time binding x) Load time binding y) Execution time binding Unit 3 Memory Management Mr. Hardik Vyas Page 13

14 2. What is the significance of first fit memory allocation policy? 3. From where does scanning for blocks begin in next fit memory allocation policy? 4. State the drawback of best fit memory allocation policy. 5. What do you understand by worst fit memory allocation policy? 6. What do you understand by TSR? 7. What is page hit and page miss? 8. Differentiate between logical address space and physical address space. 9. State the functionality of the following: PTBR, PTLR, STBR, STLR 10. What is dynamic linking? 11. What do you understand by fixed partitioning and variable partitioning? 12. What do you mean by overlays? 13. Differentiate between physical memory and virtual memory. 14. When does the page fault occur? 15. What is the significance of Page Replacement Policy? 16. What do you mean by trap? Long Questions :- 1. Give the relative pros and cons of load time dynamic linking and run-time dynamic linking. Differentiate them from static linking. 2. Explain stages of linking and loading. 3. Explain the three different stages for binding of instructions and data to memory with necessary diagram. 4. Differentiate between contiguous memory allocation and non-contiguous memory allocation. 5. Give arguments to support variable partitioning for main memory management. 6. Describe the first fit, best fit, next fit and worse fit strategies for disk space allocation. 7. Write a note on memory management technique of segmentation with necessary diagram. 8. Explain the memory management technique of paging with necessary diagram. 9. Justify: There are pros and cons of choosing a small as well as large page size. 10. Discuss the scheme that falls between fixed and dynamic partitioning. 11. Write the steps for handling page fault with necessary diagram. 12. Describe the technique of swapping with necessary diagram. 13. Why page size is always power of 2? 14. Describe FIFO, LRU and NFU page replacement algorithm with their advantages and disadvantages. 15. Give difference between the following :- a) Paging and Segmentation b) Internal fragmentation and External fragmentation 16. When does thrashing occur? How does system detects it? What system can do to overcome this problem? 17. What is fragmentation? Different types of fragmentation? 18. Consider a movie player application that supports functions like play movie, skip forward x frames and skip backward x frames. Suggest a memory management policy that will be best suited for this application. Algorithm Questions :- 1. Consider the following page reference string: 1,2,3,4,2,1,5,6,2,1,2,3,7,6,3,2,1,2,3,6 How many page faults is occur for the following replacement? Consider the memory is empty Mr. Hardik Vyas Page 14

15 initially. And memory having 5 frame: 1) LRU Page Replacement 2) FIFO Page Replacement 3) Optimal Page Replacement 2. Consider following page reference string: 1, 2, 3, 4, 1, 4, 5, 6, 2, 1, 3, 7, 4, 2, 1, 3, 5, 6, 2, 1 How many page faults is occur for the following replacement? Consider the memory is empty initially. Memory having 4 frames. 1) LRU page replacement 2) FIFO page replacement 3. Consider the following page reference string: 1,2,3,4,1,6,5,6,2,1,3,7,4,2,1,3,5,7,2,1 How many page faults are occurring for the following replacement? Consider the memory is empty initially and memory having 4 frame. 1) LRU Page Replacement 2) FIFO Page Replacement 3) Optimal Page Replacement 4. Consider the following page reference string: 7, 0, 1, 2, 0, 3, 0, 4, 2, 3, 0, 3, 2, 1, 2, 0, 1, 7, 0, 1 How many page faults are occurred for the following replacement? Consider the memory is empty initially. And the memory with 3 frames: 1) LRU Page Replacement 2) FIFO Page Replacement 3) NFU Page Replacement Fill in the blanks :- 1. If a program is moved out or terminates, it creates a in main memory. 2. If an item is deleted from a dynamic data structure, then OS does not collect free space immediately for allocation. So such areas are called. 3. When the executable is resident in the main memory, it is a process. 4. We cannot load the process even if space is there in memory as some process other is currently occupying the area which is needed by the process. So to overcome this problem processes are generated to be. 5. The address allocation by the compiler is called. 6. involve moving data and program segments in and out of memory essentially reusing the area in main memory. 7. Both fixed and dynamic partitioning suffers from fragmentation. 8. Paging suffers from and Segmentation suffers from. 9. Base register holds the. 10. TLB stands for. 11. fragmentation refers to the wasted space internal to a partition due to the fact that the block of data loaded is smaller than the partition. 12. fragmentation is a phenomenon associated with dynamic partitioning, and refers to the fact that a large number of small areas of main memory external to any partition. 13. The technique that has been used to keep both internal and external fragmentations low is partitioning. Mr. Hardik Vyas Page 15

16 14. The actual size of main memory is referred to as memory and the logical addressable space is referred to as memory. 15. During the execution of the process it generates instructions and data references from within a small range which is referred to as. 16. Paging implementation requires and. 17. The memory management technique paging implements linking of data and instructions. 18. The memory management technique segmentation implements linking of data and instructions. 19. is caused by under-allocation of the minimum number of pages required by a process, forcing it to continuously page fault. 20. The system can detect by evaluating the level of CPU utilization as compared to the level of multiprogramming. 21. The set of pages being used by a process is referred to as and the set of pages needed by a process at a time is referred to as. 22. OS defines as a fixed time interval preceding the current time. 23. The drop in the level of system throughput resulting from frequent page replacement is called. 24. Thrashing can be eliminated by reducing the level of. 25. Physical memory is divided into. 26. Logical memory is divided into. 27. A frame has a same size as size. 28. The memory allocation policy allocates the smallest block among those that are large enough for the new process. 29. Logical address space is a collection of. 30. supports table look-up for a segment and an offset within that segment. State True or False :- 1. Block oriented devices are recognized as special files. 2. Logical and physical addresses are the same in compile-time and load-time address-binding schemes. 3. Linking postponed until execution time is referred to as static. 4. A small piece of code, stub, used to locate the appropriate memory-resident library routine. 5. The memory allocation policies first-fit and best-fit are better than worst-fit in terms of speed and storage utilization. 6. External fragmentation means that the total memory space exists to satisfy a request, but it is not contiguous. 7. To minimize external fragmentation, a technique known as compaction is used. 8. The buddy system of partitioning relies on the fact that space allocations can be conveniently handled in sizes of power of Paging implementation requires HW and SW support. 10. Page can be defined as same sized blocks in logical memory. 11. Page offset is used as an index into a page table which contains base address of each page in physical memory. 12. Page-table length register (PRLR) indicates size of the page table. 13. The buddy system has the advantage that it minimizes external fragmentation. 14. In paging, a process address space is linear (uni-directional). 15. Paging support locality of reference for efficient access 16. The FIFO page replacement policy simply removes pages in the order they arrived in the main memory. Mr. Hardik Vyas Page 16

17 17. In thrashing technique, a process is busy swapping pages in and out. 18. A program is a collection of segments. 19. Segmentation is the scheme that supports virtual memory. 20. TLB decrease the performance of page frame access. 21. With best fit, variable partitions minimize internal fragmentation. Multiple choice questions:- 1. Which of the following are issues related to main memory? A. Allocation B. Garbage collection C. Protection D. All of the above 2. Fixed and dynamic partitioning suffers from which of the following fragmentation? A. Internal B. External C. None D. Both A and B 3. Which of the following is/are fastest memory allocation policy? A. First Fit B. Best Fit C. Worst Fit D. Next Fit 4. What replacement policy is used by Windows NT? A. LRU B. NFU C. FIFO D. Clock Replacement 5. If the hit ratio to a TLB is 80%, and it takes 15 nanoseconds to search the TLB, and 150 nanoseconds to access the main memory, then what must be the effective memory access time in nanoseconds? A. 185 B. 195 C. 205 D If the no of pages in a 32 bit machine is 8kB then what is the size of the page table? A. 8kb B. 16kb C. 4kb D. Can t say 7. In a 64 bit machine, with 256 MB RAM, and a 4KB page size, how many entries will there be in the page table if it s inverted? A. 2^16 B. 2^50 C. 2^14 D. 2^10 8. Locality of reference implies that the page reference being made by a process A. will always be to the page used in the previous page reference. B. is likely to be the one of the pages used in the last few page references. C. will always be to one of the pages existing in memory. Mr. Hardik Vyas Page 17

18 D. will always lead to a page fault. 9. Relocatable programs A. cannot be used with fixed partitions B. can be loaded almost anywhere in memory C. do not need a linker D. can be loaded only at one specific location 10. The memory allocation scheme subject to external fragmentation is A. segmentation B. swapping C. pure demand paging D. multiple fixed contiguous partitions 11. Page fault frequency in an operating system is reduced when the A. processes tend to the I/O-bound B. size of pages is reduced C. processes tend to be CPU-bound D. locality of reference is applicable to the process 12. Which of the following is a technique of temporarily removing inactive programs from the memory of computer system? A. Swapping B. Spooling C. Semaphore D. Scheduler 13. Which of the following is concern with Paging memory management scheme? A. Permits the logical address space of a process to be non-contiguous B. Avoids external fragmentation and the need for compaction C. Solves the considerable problem of fitting memory chunks of fixed sizes onto the backing store D. All of the above 14. Which of the following methods of binding instructions and data to memory is performed by most general-purpose operating systems? A. interrupt binding B. compile time binding C. execution time binding D. load time binding 15. Which of the following is an address generated by a CPU? A. physical address B. logical address C. post relocation register address D. Memory-Management Unit (MMU) generated address 16. Which of the following partitioning relies on the fact that space allocations can be conveniently handled in sizes of power of 2? A. Fixed B. Variable C. Dynamic D. Buddy 17. Suppose we are operating with execution-time binding and the physical address generated is 305. The relocation register is set to 99. What is the corresponding logical address? A. 404 B. 206 Mr. Hardik Vyas Page 18

19 C. 200 D Which of the following is true for dynamically linked library? A. loading is postponed until execution time B. system language libraries are treated like any other object module C. more disk space is used than the option of using a statically-linked library D. a stub is included in the image for each library-routine reference 19. Which of the following dynamic storage-allocation algorithms results in the largest leftover hole in memory? A. first fit B. best fit C. worst fit D. next fit 20. Which of the following is true of compaction? A. It can be done at assembly, load, or execution time. B. It is used to solve the problem of internal fragmentation. C. It cannot shuffle memory contents. D. It is possible only if relocation is dynamic and done at execution time. 21. Which if the following is the purpose of a Memory Management Unit? A. perform run-time mapping from virtual to physical addresses B. ensure protection of the memory space allocated to every process C. Both A and B are correct responses. D. Neither A nor B 22. What is the process called when executable are resident in main memory? A. Ready B. Runnable C. New D. None of the above 23. Which of the following type of partition has the problem of internal fragmentation? A. Fixed B. Variable C. Dynamic D. All of the above 24. Which of the following result when we find that a page frame reference is in main memory? A. Page hit B. Page miss C. Cache hit D. Cache miss 25. Which of the following problem is raised due to the frequent page replacement (Thrashing)? A. Reduce throughput B. Minimize page fault C. Maximize page fault D. None of the above Unit 4: Input Output Management Short questions 1. Which are the three levels where device communication is required? 2. List out character-oriented devices. 3. What does OS provides for uniform and easy-to-use IO mechanism? Mr. Hardik Vyas Page 19

20 4. List out various IO handling mechanisms. 5. List out four basic modes of IO operations. 6. What is the significance of Programmed Data mode of IO operation? 7. What is polling? 8. What is interrupt? 9. List three types of interrupt. 10. What is meant by system mode and user mode operations in software interrupt? 11. When DMA mode of data transfer is used? 12. Define Device Driver. 13. What do you mean by buffer? 14. Where does the information of DMA control stored? 15. Give full form for following: PDA, IRQ, ISR, IVR, IVT, MMIO, USB, WUSB 16. What is the significance on MMIO operation? 17. List out the steps that are performed in MMIO. 18. Define single buffer, double buffer and circular buffer. 19. What do you understand by rotational latency? 20. What is downstream and upstream communication in terms of USB? 21. What is blind mating in USB? 22. In which categories USB specifications classifies device communication? 23. What is system bus? 24. List of modes of communication that are supported by PCI bus. 25. What is service discovery protocol? 26. What is logical link control and adaptation protocol? 27. What is link management protocol? 28. What do you mean by Hot-swappable in terms of USB? 29. What is the significance of CDE? 30. Define Spooling, IO channels, Caching. 31. What is the importance of Clock in CPU? Long questions 1. Explain in detail issues in Input output management. 2. Explain any two basic modes of IO operations. 3. Write a note on Interrupt mode of IO operation. 4. Discuss Issues handling interrupts. 5. What are the different modes of Interrupt? How is polling achieved? 6. Describe programmed data mode of input output organization. 7. How is the interrupt enabled and detected? 8. What is an interrupt vector? How is the interrupt service obtained with vectored interrupt? 9. Write the steps for servicing an interrupt. 10. Explain in detail IO operation that supports the illusion that IO is performed at specified memory address. 11. Explain Direct Memory Access mode of data transfer. 12. State memory mapped IO, port-mapped IO and logical port-based IO modes of data transfer. 13. What is a device driver? Give a schematic explaining how a device driver helps establish device communication. 14. Explain the process that is performed to handle each IO request from an application. 15. Explain how interrupt can be handled using device drivers. 16. Discuss the concept of management of buffers. Mr. Hardik Vyas Page 20

21 17. What is the purpose of resource table? 18. Explain the disk scheduling policies of FCFS, SSF, Elevator and circular scan. 19. Write a short note on universal serial bus (USB). 20. Explain PCI bus. 21. List out System calls supported by device driver for device specific functionalities. 22. Write a short note on Bluetooth interface. 23. Suppose that a disk drive has 200 cylinders, numbered from 0 to 199. The disk head is initially at cylinder 53. The queue of pending requests, in FIFO order, is : 98, 183, 37, 122, 14, 124, 65, 67 Starting from the current head position, what is the total distance (in cylinders) that the disk arm moves to satisfy all the pending requests for each of the following disk-scheduling algorithms? a) FCFS c) Scan (Elevator) b) SSTF d) C-Scan 24. Suppose that a disk drive has 200 cylinders, numbered from 0 to 199. The disk head is initially at cylinder 90. The queue of pending requests, in FIFO order, is : 59, 41, 172, 74, 52, 85, 139, 12, 194, 87 Starting from the current head position, what is the total distance (in cylinders) that the disk arm moves to satisfy all the pending requests for each of the following disk-scheduling algorithms? c) FCFS c) Scan (Elevator) d) SSTF d) C-Scan 25. Discuss classification of devices and modes of communication given in USB specification. Fill in the blanks 1. OS provides for uniform and easy to use IO mechanism. 2. The OS manages buffer to comply with the requirements of both the & of data. 3. Most network cards are enabled to facilitate DMA mode of IO with communication infrastructure. 4. Synchronizing Events for the process communicate through. 5. In Programmed data mode, an IO instruction is issued to an IO device and the program executes in mode till the IO is completed. 6. PDA stands for. 7. A key characteristic of embedded systems is to recognize occurrence of which may be by monitoring variable values or identifying an event. 8. In mode an IO instruction is issued to an IO device and the program executes in busy-waiting (idling) mode till the IO is completed. 9. During the period the processor is continually interrogating to check if the device has completed IO. 10. In mode of data transfer, the system interrogates each device in turn to determine if it is ready to communicate. 11. In internal interrupt, the source of interrupt may be a resident process or a function from within the processor. 12. By setting, user can disable some interrupt request lines to send interrupt requests. 13. In mode of data transfer, IO is performed on large data blocks. 14. If a higher priority device seeks an interrupt, the priority device may be denied the per-mission to raise an interrupt. 15. The direct memory access, or DMA ensures access to main memory without processor Mr. Hardik Vyas Page 21

22 intervention or support. Such independence from processor makes this mode of transfer extremely. 16. The DMA control requires the information on address in main memory and size of data for transfer. 17. A device driver is a specialized. 18. The buffers are usually set up in the memory. 19. When a process initiates transfer, its execution is briefly suspended using an interrupt to set up DMA control. 20. The network-oriented traffic between machines may be handled in mode. 21. An IO operation is the combination of and instructions. 22. BT hardware node has and module. 23. An additional arm movement is required when information is stored on different cylinder, which results in some delay referred to as. 24. refers to the time spent in waiting for a sector in rotation to come under the read or write head. 25. BT protocol encourages devices to communicate. 26. BT is regulated by that can be mounted on communicating device. State true or false 1. OS is not able to manage buffer for uniform and easy to use IO mechanism. 2. Event-generating devices and character-oriented devices are IO devices that operate at good rate. 3. PDA or mobile phones can act as an access device. 4. Programmed data mode IO operation does not ensure that an execution of IO instruction shall not advance till it is completed. 5. Polling is commonly used by systems to interrogate ports on a network. 6. In external interrupt source of interrupt is other than process or process-related events. 7. It is impossible to disable interrupt from interrupt request lines. 8. The three types of interrupts are internal interrupt, external interrupt and user defined interrupt. 9. IO management requires that a proper set-up is created by an application on computer system with an IO device. 10. DMA is the most preferred mode of communication to support network traffic. 11. The DMA controller records the receipt of relevant information and acknowledges the DMA complete. 12. The modes of IO stipulate whenever IO happens with a device it requires writing into or reading from device controller register. 13. MMIO operation supports illusion that the read or write operation is happening from or to certain locations in the address space. 14. MMIO does not require sharing a part of virtual address space. 15. The networked systems employ the concept of a socket to connect hosts. 16. The interrupt transfer is ideally suited for a large amount of critical information. 17. Device driver is not able to communicate with IO devices. 18. Device Driver is specifically written to manage communication with an identified class of devices. 19. Device drivers present a uniform interface to the OS. 20. In double buffer, there is single buffer. 21. The double buffer is a circular queue of size two. 22. The buffers are usually set up in the main memory. Mr. Hardik Vyas Page 22

23 23. In the C-scan policy service is provided in one direction and then wraps round. 24. FCFS is not a very good policy. 25. The first come first served policy entails that the service be provided strictly in the sequence in which the requests arrived. 26. With multi-programming, there will be many user jobs seeking disk access. 27. The disk IO is always in terms of blocks of data. 28. The IO is to read from, or write into, a main memory. 29. OS uses CPU clock to provide a variety of system-and application-based services. 30. Most OS reserves some address space for use as exclusive addresses for devices. 31. USB port is not able to support Plug-and-play devices. 32. Bulk transfer is usually medium speed devices such as printer. 33. Isochronous transfers are carried out without any error correction support. 34. BT is short range radio interface. Multiple choice questions 1. Which of the following types of data are managed by OS with the help of buffer? A. Producer B. Consumer C. Instruction D. Both A & B 2. Which of the following can be used as an access device? A. PDA B. Mobile phones C. Processor D. Both A & B 3. Which of the following are character-oriented devices? A. Keyboard B. Voice-based input C. Mouse D. All of the above 4. Which of the following are the basic modes of IO operations? A. Programmed mode B. Polling mode C. DMA mode D. All of the above 5. In which of the following mode an IO instruction is issued to an IO devices and the program executes in busy waiting mode till the IO is completed? A. Programmed Data mode B. Interrupt mode C. DMA mode D. Polling mode 6. In which of the following mode of data transfer, the system interrogates each device in turn to determine if it is ready to communicate or not? A. Programmed Data mode B. Interrupt mode C. DMA mode D. Polling mode 7. Which of the following are the types of interrupts? A. Internal Mr. Hardik Vyas Page 23

24 B. External C. Software D. All of the above 8. Which of the following modes of operations are offered by OS? A. User mode B. System mode C. Both A & B D. None 9. Which of the following is the source of internal interrupt? A. Memory resident process B. Function within processor C. Other than processor related events D. Only A & B 10. Identify the form of communication best describes the IO mode amongst the following: A. Programmed mode of data transfer B. DMA C. Interrupt mode D. Polling 11. From amongst the following given scenarios determine the right one to justify interrupt mode of data transfer era Systems Prof. P. C. P. Science A. Bulk transfer of several kilo-byte B. Moderately large data transfer but more that 1 KB C. Short events like mouse action D. Key board inputs 12. Which of the following can be nested interrupts: A. Soft-ware interrupts B. Hardware interrupts C. External interrupts D. None of the above 13. DMA is set up using an interrupt A. True B. False 14. Suppose a DMA is set up to transfer 100KB data. Identify which of the following statements are true. A. The processor is interrupted after every byte of transfer B. The processor interrogates at the end of every clock cycle if the transfer is complete C. The DMA transfer the data independent of processor till the transfer is completed. D. None of the above 15. Which of the following is present in DMA controller? A. Acknowledge B. Interrupt C. Read/write lines of control D. All of the above 16. Which of the following requires sharing a part of virtual address space? A. Port-mapped IO B. Memory Mapped IO C. Logical Port-based IO D. B & C 17. Which of the following is the full form of SSTF? Mr. Hardik Vyas Page 24

25 A. Shortest-Seek-time-first scheduling B. Small small-time-first scheduling C. Simple-seek-time-first scheduling D. Small-simple-time-first scheduling 18. For what types of operations is DMA useful? A. For large & fast data transfers between memory & I/O devices. B. For large & slow data transfers between memory & I/O devices. C. For slow & small data transfers between memory & I/O devices. D. For small data transfers between memory & cache. 19. The programmed mode of IO is a blocking IO. A. True B. False 20. We describe a protocol of input device communication below. A. Each device has a distinct address B. The bus controller scans each device in sequence of increasing address value to determine if the entity wishes to communicate. C. The device ready to communicate leaves it data in IO register. D. The data is picked up and the controller moves to step-a above. 21. Which of the following system calls are supported by Device Driver? A. Open() B. Close() C. Lseek() D. All of the above 22. DMA is set up using an interrupt C. True D. False 23. Suppose a DMA is set up to transfer 100KB data. Identify which of the following statements are true. E. The processor is interrupted after every byte of transfer F. The processor interrogates at the end of every clock cycle if the transfer is complete G. The DMA transfer the data independent of processor till the transfer is completed. H. None of the above 24. A Double buffer is a cyclic buffer with cycle length of 2. A. True B. False 25. Who amongst the following sets the timer for pre-emptive scheduling: A. The user B. The processor clock C. The operating system scheduler D. None of the above 26. IO channels are merely communication wires with no buffers. A. True B. False 27. Put the following disk scheduling policies in the order that will result in minimum amount of head movement. A. FCFS B. Circular scan C. Elevator algorithm D. SSF Mr. Hardik Vyas Page 25

B. V. Patel Institute of Business Management, Computer &Information Technology, UTU

B. V. Patel Institute of Business Management, Computer &Information Technology, UTU BCA-3 rd Semester 030010304-Fundamentals Of Operating Systems Unit: 1 Introduction Short Answer Questions : 1. State two ways of process communication. 2. State any two uses of operating system according

More information

MC7204 OPERATING SYSTEMS

MC7204 OPERATING SYSTEMS MC7204 OPERATING SYSTEMS QUESTION BANK UNIT I INTRODUCTION 9 Introduction Types of operating systems operating systems structures Systems components operating systems services System calls Systems programs

More information

Department of Computer applications. [Part I: Medium Answer Type Questions]

Department of Computer applications. [Part I: Medium Answer Type Questions] Department of Computer applications BBDNITM, Lucknow MCA 311: OPERATING SYSTEM [Part I: Medium Answer Type Questions] UNIT 1 Q1. What do you mean by an Operating System? What are the main functions of

More information

Techno India Batanagar Department of Computer Science & Engineering. Model Questions. Multiple Choice Questions:

Techno India Batanagar Department of Computer Science & Engineering. Model Questions. Multiple Choice Questions: Techno India Batanagar Department of Computer Science & Engineering Model Questions Subject Name: Operating System Multiple Choice Questions: Subject Code: CS603 1) Shell is the exclusive feature of a)

More information

4.1 Paging suffers from and Segmentation suffers from. Ans

4.1 Paging suffers from and Segmentation suffers from. Ans Worked out Examples 4.1 Paging suffers from and Segmentation suffers from. Ans: Internal Fragmentation, External Fragmentation 4.2 Which of the following is/are fastest memory allocation policy? a. First

More information

Input Output (IO) Management

Input Output (IO) Management Input Output (IO) Management Prof. P.C.P. Bhatt P.C.P Bhatt OS/M5/V1/2004 1 Introduction Humans interact with machines by providing information through IO devices. Manyon-line services are availed through

More information

QUESTION BANK UNIT I

QUESTION BANK UNIT I QUESTION BANK Subject Name: Operating Systems UNIT I 1) Differentiate between tightly coupled systems and loosely coupled systems. 2) Define OS 3) What are the differences between Batch OS and Multiprogramming?

More information

Chapter 8: Memory- Management Strategies. Operating System Concepts 9 th Edition

Chapter 8: Memory- Management Strategies. Operating System Concepts 9 th Edition Chapter 8: Memory- Management Strategies Operating System Concepts 9 th Edition Silberschatz, Galvin and Gagne 2013 Chapter 8: Memory Management Strategies Background Swapping Contiguous Memory Allocation

More information

( D ) 4. Which is not able to solve the race condition? (A) Test and Set Lock (B) Semaphore (C) Monitor (D) Shared memory

( D ) 4. Which is not able to solve the race condition? (A) Test and Set Lock (B) Semaphore (C) Monitor (D) Shared memory CS 540 - Operating Systems - Final Exam - Name: Date: Wenesday, May 12, 2004 Part 1: (78 points - 3 points for each problem) ( C ) 1. In UNIX a utility which reads commands from a terminal is called: (A)

More information

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING UNIT I

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING UNIT I DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING Year and Semester : II / IV Subject Code : CS6401 Subject Name : Operating System Degree and Branch : B.E CSE UNIT I 1. Define system process 2. What is an

More information

SNS COLLEGE OF ENGINEERING

SNS COLLEGE OF ENGINEERING SNS COLLEGE OF ENGINEERING Coimbatore. Department of Computer Science and Engineering Question Bank- Even Semester 2015-2016 CS6401 OPERATING SYSTEMS Unit-I OPERATING SYSTEMS OVERVIEW 1. Differentiate

More information

CLASS: II YEAR / IV SEMESTER CSE SUBJECT CODE AND NAME: CS6401 OPERATING SYSTEMS UNIT I OPERATING SYSTEMS OVERVIEW

CLASS: II YEAR / IV SEMESTER CSE SUBJECT CODE AND NAME: CS6401 OPERATING SYSTEMS UNIT I OPERATING SYSTEMS OVERVIEW CLASS: II YEAR / IV SEMESTER CSE SUBJECT CODE AND NAME: CS6401 OPERATING SYSTEMS SYLLABUS UNIT I OPERATING SYSTEMS OVERVIEW Computer System Overview-Basic Elements, Instruction Execution, Interrupts, Memory

More information

Operating Systems Comprehensive Exam. Spring Student ID # 3/16/2006

Operating Systems Comprehensive Exam. Spring Student ID # 3/16/2006 Operating Systems Comprehensive Exam Spring 2006 Student ID # 3/16/2006 You must complete all of part I (60%) You must complete two of the three sections in part II (20% each) In Part I, circle or select

More information

Chapter 8: Memory-Management Strategies

Chapter 8: Memory-Management Strategies Chapter 8: Memory-Management Strategies Chapter 8: Memory Management Strategies Background Swapping Contiguous Memory Allocation Segmentation Paging Structure of the Page Table Example: The Intel 32 and

More information

CHAPTER NO - 1 : Introduction:

CHAPTER NO - 1 : Introduction: Sr. No L.J. Institute of Engineering & Technology Semester: IV (26) Subject Name: Operating System Subject Code:21402 Faculties: Prof. Saurin Dave CHAPTER NO - 1 : Introduction: TOPIC:1 Basics of Operating

More information

CSE 4/521 Introduction to Operating Systems. Lecture 27 (Final Exam Review) Summer 2018

CSE 4/521 Introduction to Operating Systems. Lecture 27 (Final Exam Review) Summer 2018 CSE 4/521 Introduction to Operating Systems Lecture 27 (Final Exam Review) Summer 2018 Overview Objective: Revise topics and questions for the final-exam. 1. Main Memory 2. Virtual Memory 3. Mass Storage

More information

Chapters 9 & 10: Memory Management and Virtual Memory

Chapters 9 & 10: Memory Management and Virtual Memory Chapters 9 & 10: Memory Management and Virtual Memory Important concepts (for final, projects, papers) addressing: physical/absolute, logical/relative/virtual overlays swapping and paging memory protection

More information

Chapter 8: Main Memory

Chapter 8: Main Memory Chapter 8: Main Memory Chapter 8: Memory Management Background Swapping Contiguous Memory Allocation Segmentation Paging Structure of the Page Table Example: The Intel 32 and 64-bit Architectures Example:

More information

Addresses in the source program are generally symbolic. A compiler will typically bind these symbolic addresses to re-locatable addresses.

Addresses in the source program are generally symbolic. A compiler will typically bind these symbolic addresses to re-locatable addresses. 1 Memory Management Address Binding The normal procedures is to select one of the processes in the input queue and to load that process into memory. As the process executed, it accesses instructions and

More information

Chapter 7: Main Memory. Operating System Concepts Essentials 8 th Edition

Chapter 7: Main Memory. Operating System Concepts Essentials 8 th Edition Chapter 7: Main Memory Operating System Concepts Essentials 8 th Edition Silberschatz, Galvin and Gagne 2011 Chapter 7: Memory Management Background Swapping Contiguous Memory Allocation Paging Structure

More information

Chapter 8: Main Memory. Operating System Concepts 9 th Edition

Chapter 8: Main Memory. Operating System Concepts 9 th Edition Chapter 8: Main Memory Silberschatz, Galvin and Gagne 2013 Chapter 8: Memory Management Background Swapping Contiguous Memory Allocation Segmentation Paging Structure of the Page Table Example: The Intel

More information

Exam Guide COMPSCI 386

Exam Guide COMPSCI 386 FOUNDATIONS We discussed in broad terms the three primary responsibilities of an operating system. Describe each. What is a process? What is a thread? What parts of a process are shared by threads? What

More information

CHAPTER 8: MEMORY MANAGEMENT. By I-Chen Lin Textbook: Operating System Concepts 9th Ed.

CHAPTER 8: MEMORY MANAGEMENT. By I-Chen Lin Textbook: Operating System Concepts 9th Ed. CHAPTER 8: MEMORY MANAGEMENT By I-Chen Lin Textbook: Operating System Concepts 9th Ed. Chapter 8: Memory Management Background Swapping Contiguous Memory Allocation Segmentation Paging Structure of the

More information

CHAPTER 8 - MEMORY MANAGEMENT STRATEGIES

CHAPTER 8 - MEMORY MANAGEMENT STRATEGIES CHAPTER 8 - MEMORY MANAGEMENT STRATEGIES OBJECTIVES Detailed description of various ways of organizing memory hardware Various memory-management techniques, including paging and segmentation To provide

More information

Chapter 8: Main Memory

Chapter 8: Main Memory Chapter 8: Main Memory Silberschatz, Galvin and Gagne 2013 Chapter 8: Memory Management Background Swapping Contiguous Memory Allocation Segmentation Paging Structure of the Page Table Example: The Intel

More information

Memory management. Last modified: Adaptation of Silberschatz, Galvin, Gagne slides for the textbook Applied Operating Systems Concepts

Memory management. Last modified: Adaptation of Silberschatz, Galvin, Gagne slides for the textbook Applied Operating Systems Concepts Memory management Last modified: 26.04.2016 1 Contents Background Logical and physical address spaces; address binding Overlaying, swapping Contiguous Memory Allocation Segmentation Paging Structure of

More information

Chapter 9 Memory Management Main Memory Operating system concepts. Sixth Edition. Silberschatz, Galvin, and Gagne 8.1

Chapter 9 Memory Management Main Memory Operating system concepts. Sixth Edition. Silberschatz, Galvin, and Gagne 8.1 Chapter 9 Memory Management Main Memory Operating system concepts. Sixth Edition. Silberschatz, Galvin, and Gagne 8.1 Chapter 9: Memory Management Background Swapping Contiguous Memory Allocation Segmentation

More information

CS6401- Operating System UNIT-III STORAGE MANAGEMENT

CS6401- Operating System UNIT-III STORAGE MANAGEMENT UNIT-III STORAGE MANAGEMENT Memory Management: Background In general, to rum a program, it must be brought into memory. Input queue collection of processes on the disk that are waiting to be brought into

More information

Memory Management. CSCI 315 Operating Systems Design Department of Computer Science

Memory Management. CSCI 315 Operating Systems Design Department of Computer Science Memory Management CSCI 315 Operating Systems Design Department of Computer Science Notice: The slides for this lecture are based on those from Operating Systems Concepts, 9th ed., by Silberschatz, Galvin,

More information

Chapter 8: Memory- Management Strategies. Operating System Concepts 9 th Edition

Chapter 8: Memory- Management Strategies. Operating System Concepts 9 th Edition Chapter 8: Memory- Management Strategies Operating System Concepts 9 th Edition Silberschatz, Galvin and Gagne 2013 Chapter 8: Memory Management Strategies Background Swapping Contiguous Memory Allocation

More information

Chapter 8: Memory- Management Strategies

Chapter 8: Memory- Management Strategies Chapter 8: Memory Management Strategies Chapter 8: Memory- Management Strategies Background Swapping Contiguous Memory Allocation Segmentation Paging Structure of the Page Table Example: The Intel 32 and

More information

Memory Management Cache Base and Limit Registers base limit Binding of Instructions and Data to Memory Compile time absolute code Load time

Memory Management Cache Base and Limit Registers base limit Binding of Instructions and Data to Memory Compile time absolute code Load time Memory Management To provide a detailed description of various ways of organizing memory hardware To discuss various memory-management techniques, including paging and segmentation To provide a detailed

More information

Memory Management. Reading: Silberschatz chapter 9 Reading: Stallings. chapter 7 EEL 358

Memory Management. Reading: Silberschatz chapter 9 Reading: Stallings. chapter 7 EEL 358 Memory Management Reading: Silberschatz chapter 9 Reading: Stallings chapter 7 1 Outline Background Issues in Memory Management Logical Vs Physical address, MMU Dynamic Loading Memory Partitioning Placement

More information

INSTITUTE OF AERONAUTICAL ENGINEERING Dundigal, Hyderabad COMPUTER SCIENCE AND ENGINEERING QUESTION BANK OPERATING SYSTEMS

INSTITUTE OF AERONAUTICAL ENGINEERING Dundigal, Hyderabad COMPUTER SCIENCE AND ENGINEERING QUESTION BANK OPERATING SYSTEMS INSTITUTE OF AERONAUTICAL ENGINEERING Dundigal, Hyderabad - 500 043 COMPUTER SCIENCE AND ENGINEERING QUESTION BANK Title Code Regulation Structure Coordinator Team of Instructors OPERATING SYSTEMS A50510

More information

Module 8: Memory Management

Module 8: Memory Management Module 8: Memory Management Background Logical versus Physical Address Space Swapping Contiguous Allocation Paging Segmentation Segmentation with Paging Operating System Concepts 8.1 Silberschatz and Galvin

More information

CS307: Operating Systems

CS307: Operating Systems CS307: Operating Systems Chentao Wu 吴晨涛 Associate Professor Dept. of Computer Science and Engineering Shanghai Jiao Tong University SEIEE Building 3-513 wuct@cs.sjtu.edu.cn Download Lectures ftp://public.sjtu.edu.cn

More information

Virtual Memory Outline

Virtual Memory Outline Virtual Memory Outline Background Demand Paging Copy-on-Write Page Replacement Allocation of Frames Thrashing Memory-Mapped Files Allocating Kernel Memory Other Considerations Operating-System Examples

More information

Main Memory (Part I)

Main Memory (Part I) Main Memory (Part I) Amir H. Payberah amir@sics.se Amirkabir University of Technology (Tehran Polytechnic) Amir H. Payberah (Tehran Polytechnic) Main Memory 1393/8/5 1 / 47 Motivation and Background Amir

More information

Main Points of the Computer Organization and System Software Module

Main Points of the Computer Organization and System Software Module Main Points of the Computer Organization and System Software Module You can find below the topics we have covered during the COSS module. Reading the relevant parts of the textbooks is essential for a

More information

Background. Contiguous Memory Allocation

Background. Contiguous Memory Allocation Operating System Lecture 8 2017.5.9 Chapter 8 (Main Memory) Background Swapping Contiguous Memory Allocation Segmentation - Paging Memory Management Selection of a memory-management method for a specific

More information

Department of CSIT ( G G University, Bilaspur ) Model Answer 2013 (Even Semester) - AR-7307

Department of CSIT ( G G University, Bilaspur ) Model Answer 2013 (Even Semester) - AR-7307 Department of CSIT ( G G University, Bilaspur ) Model Answer 2013 (Even Semester) - AR-7307 Class: MCA Semester: II Year:2013 Paper Title: Principles of Operating Systems Max Marks: 60 Section A: (All

More information

Final Exam Preparation Questions

Final Exam Preparation Questions EECS 678 Spring 2013 Final Exam Preparation Questions 1 Chapter 6 1. What is a critical section? What are the three conditions to be ensured by any solution to the critical section problem? 2. The following

More information

Module 8: Memory Management

Module 8: Memory Management Module 8: Memory Management Background Logical versus Physical Address Space Swapping Contiguous Allocation Paging Segmentation Segmentation with Paging 8.1 Background Program must be brought into memory

More information

(MCQZ-CS604 Operating Systems)

(MCQZ-CS604 Operating Systems) command to resume the execution of a suspended job in the foreground fg (Page 68) bg jobs kill commands in Linux is used to copy file is cp (Page 30) mv mkdir The process id returned to the child process

More information

Process- Concept &Process Scheduling OPERATING SYSTEMS

Process- Concept &Process Scheduling OPERATING SYSTEMS OPERATING SYSTEMS Prescribed Text Book Operating System Principles, Seventh Edition By Abraham Silberschatz, Peter Baer Galvin and Greg Gagne PROCESS MANAGEMENT Current day computer systems allow multiple

More information

Chapter 9: Memory Management. Background

Chapter 9: Memory Management. Background 1 Chapter 9: Memory Management Background Swapping Contiguous Allocation Paging Segmentation Segmentation with Paging 9.1 Background Program must be brought into memory and placed within a process for

More information

Module 9: Memory Management. Background. Binding of Instructions and Data to Memory

Module 9: Memory Management. Background. Binding of Instructions and Data to Memory Module 9: Memory Management Background Logical versus Physical Address Space Swapping Contiguous Allocation Paging Segmentation Segmentation with Paging 9.1 Background Program must be brought into memory

More information

Part Three - Memory Management. Chapter 8: Memory-Management Strategies

Part Three - Memory Management. Chapter 8: Memory-Management Strategies Part Three - Memory Management Chapter 8: Memory-Management Strategies Chapter 8: Memory-Management Strategies 8.1 Background 8.2 Swapping 8.3 Contiguous Memory Allocation 8.4 Segmentation 8.5 Paging 8.6

More information

Operating Systems Unit 6. Memory Management

Operating Systems Unit 6. Memory Management Unit 6 Memory Management Structure 6.1 Introduction Objectives 6.2 Logical versus Physical Address Space 6.3 Swapping 6.4 Contiguous Allocation Single partition Allocation Multiple Partition Allocation

More information

Operating Systems Memory Management. Mathieu Delalandre University of Tours, Tours city, France

Operating Systems Memory Management. Mathieu Delalandre University of Tours, Tours city, France Operating Systems Memory Management Mathieu Delalandre University of Tours, Tours city, France mathieu.delalandre@univ-tours.fr 1 Operating Systems Memory Management 1. Introduction 2. Contiguous memory

More information

Performance of Various Levels of Storage. Movement between levels of storage hierarchy can be explicit or implicit

Performance of Various Levels of Storage. Movement between levels of storage hierarchy can be explicit or implicit Memory Management All data in memory before and after processing All instructions in memory in order to execute Memory management determines what is to be in memory Memory management activities Keeping

More information

Chapter 9 Memory Management

Chapter 9 Memory Management Contents 1. Introduction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threads 6. CPU Scheduling 7. Process Synchronization 8. Deadlocks 9. Memory Management 10. Virtual

More information

6 - Main Memory EECE 315 (101) ECE UBC 2013 W2

6 - Main Memory EECE 315 (101) ECE UBC 2013 W2 6 - Main Memory EECE 315 (101) ECE UBC 2013 W2 Acknowledgement: This set of slides is partly based on the PPTs provided by the Wiley s companion website (including textbook images, when not explicitly

More information

Logical versus Physical Address Space

Logical versus Physical Address Space CHAPTER 8: MEMORY MANAGEMENT Background Logical versus Physical Address Space Swapping Contiguous Allocation Paging Segmentation Segmentation with Paging Operating System Concepts, Addison-Wesley 1994

More information

CS370 Operating Systems

CS370 Operating Systems CS370 Operating Systems Colorado State University Yashwant K Malaiya Spring 2018 L17 Main Memory Slides based on Text by Silberschatz, Galvin, Gagne Various sources 1 1 FAQ Was Great Dijkstra a magician?

More information

Chapter 8 & Chapter 9 Main Memory & Virtual Memory

Chapter 8 & Chapter 9 Main Memory & Virtual Memory Chapter 8 & Chapter 9 Main Memory & Virtual Memory 1. Various ways of organizing memory hardware. 2. Memory-management techniques: 1. Paging 2. Segmentation. Introduction Memory consists of a large array

More information

Indian Institute of Technology, Kharagpur

Indian Institute of Technology, Kharagpur 1 Indian Institute of Technology, Kharagpur End-Spring Semester 2017-18 Date of Examination: 24-04-2018 Session: AN (2-5 pm) Duration: 3 hrs Subject No.: CS31702 Subject: COMPUTER ARCHITECTURE AND OPERATING

More information

Memory management. Requirements. Relocation: program loading. Terms. Relocation. Protection. Sharing. Logical organization. Physical organization

Memory management. Requirements. Relocation: program loading. Terms. Relocation. Protection. Sharing. Logical organization. Physical organization Requirements Relocation Memory management ability to change process image position Protection ability to avoid unwanted memory accesses Sharing ability to share memory portions among processes Logical

More information

CS6401- OPERATING SYSTEM

CS6401- OPERATING SYSTEM 1. What is an Operating system? CS6401- OPERATING SYSTEM QUESTION BANK UNIT-I An operating system is a program that manages the computer hardware. It also provides a basis for application programs and

More information

FORTH SEMESTER DIPLOMA EXAMINATION IN ENGINEERING/ TECHNOLIGY- OCTOBER, 2012

FORTH SEMESTER DIPLOMA EXAMINATION IN ENGINEERING/ TECHNOLIGY- OCTOBER, 2012 TED (10)-3071 (REVISION-2010) Reg. No.. Signature. FORTH SEMESTER DIPLOMA EXAMINATION IN ENGINEERING/ TECHNOLIGY- OCTOBER, 2012 OPERATING SYSTEM (Common to CT and IF) (Maximum marks: 100) [Time: 3 hours

More information

8.1 Background. Part Four - Memory Management. Chapter 8: Memory-Management Management Strategies. Chapter 8: Memory Management

8.1 Background. Part Four - Memory Management. Chapter 8: Memory-Management Management Strategies. Chapter 8: Memory Management Part Four - Memory Management 8.1 Background Chapter 8: Memory-Management Management Strategies Program must be brought into memory and placed within a process for it to be run Input queue collection of

More information

Chapter 8: Main Memory

Chapter 8: Main Memory Chapter 8: Main Memory Chapter 8: Memory Management Background Swapping Contiguous Memory Allocation Paging Structure of the Page Table Segmentation Example: The Intel Pentium 8.2 Silberschatz, Galvin

More information

Memory Management. Memory Management

Memory Management. Memory Management Memory Management Gordon College Stephen Brinton Memory Management Background Swapping Contiguous Allocation Paging Segmentation Segmentation with Paging 1 Background Program must be brought into memory

More information

Operating Systems Comprehensive Exam. Spring Student ID # 3/20/2013

Operating Systems Comprehensive Exam. Spring Student ID # 3/20/2013 Operating Systems Comprehensive Exam Spring 2013 Student ID # 3/20/2013 You must complete all of Section I You must complete two of the problems in Section II If you need more space to answer a question,

More information

File. File System Implementation. Operations. Permissions and Data Layout. Storing and Accessing File Data. Opening a File

File. File System Implementation. Operations. Permissions and Data Layout. Storing and Accessing File Data. Opening a File File File System Implementation Operating Systems Hebrew University Spring 2007 Sequence of bytes, with no structure as far as the operating system is concerned. The only operations are to read and write

More information

SYED AMMAL ENGINEERING COLLEGE CS6401- OPERATING SYSTEM

SYED AMMAL ENGINEERING COLLEGE CS6401- OPERATING SYSTEM Part-A SYED AMMAL ENGINEERING COLLEGE 1. What is an Operating system? CS6401- OPERATING SYSTEM QUESTION BANK UNIT-I 2. List the services provided by an Operating System? 3. What is the Kernel? 4. What

More information

Chapter 8 Memory Management

Chapter 8 Memory Management Chapter 8 Memory Management Da-Wei Chang CSIE.NCKU Source: Abraham Silberschatz, Peter B. Galvin, and Greg Gagne, "Operating System Concepts", 9th Edition, Wiley. 1 Outline Background Swapping Contiguous

More information

File Systems. OS Overview I/O. Swap. Management. Operations CPU. Hard Drive. Management. Memory. Hard Drive. CSI3131 Topics. Structure.

File Systems. OS Overview I/O. Swap. Management. Operations CPU. Hard Drive. Management. Memory. Hard Drive. CSI3131 Topics. Structure. File Systems I/O Management Hard Drive Management Virtual Memory Swap Memory Management Storage and I/O Introduction CSI3131 Topics Process Management Computing Systems Memory CPU Peripherals Processes

More information

Chapter 8: Main Memory

Chapter 8: Main Memory Chapter 8: Main Memory Operating System Concepts 8 th Edition,! Silberschatz, Galvin and Gagne 2009! Chapter 8: Memory Management Background" Swapping " Contiguous Memory Allocation" Paging" Structure

More information

Unit 3 : Process Management

Unit 3 : Process Management Unit : Process Management Processes are the most widely used units of computation in programming and systems, although object and threads are becoming more prominent in contemporary systems. Process management

More information

MEMORY MANAGEMENT/1 CS 409, FALL 2013

MEMORY MANAGEMENT/1 CS 409, FALL 2013 MEMORY MANAGEMENT Requirements: Relocation (to different memory areas) Protection (run time, usually implemented together with relocation) Sharing (and also protection) Logical organization Physical organization

More information

Chapter 8: Memory Management

Chapter 8: Memory Management Chapter 8: Memory Management Chapter 8: Memory Management Background Swapping Contiguous Allocation Paging Segmentation Segmentation with Paging 8.2 Background Program must be brought into memory and placed

More information

CS 143A - Principles of Operating Systems

CS 143A - Principles of Operating Systems CS 143A - Principles of Operating Systems Operating Systems - Review of content from midterm to final Prof. Nalini Venkatasubramanian nalini@ics.uci.edu Deadlocks System Model Resource allocation graph,

More information

Operating Systems. Memory Management. Lecture 9 Michael O Boyle

Operating Systems. Memory Management. Lecture 9 Michael O Boyle Operating Systems Memory Management Lecture 9 Michael O Boyle 1 Memory Management Background Logical/Virtual Address Space vs Physical Address Space Swapping Contiguous Memory Allocation Segmentation Goals

More information

ECE 7650 Scalable and Secure Internet Services and Architecture ---- A Systems Perspective. Part I: Operating system overview: Memory Management

ECE 7650 Scalable and Secure Internet Services and Architecture ---- A Systems Perspective. Part I: Operating system overview: Memory Management ECE 7650 Scalable and Secure Internet Services and Architecture ---- A Systems Perspective Part I: Operating system overview: Memory Management 1 Hardware background The role of primary memory Program

More information

Following are a few basic questions that cover the essentials of OS:

Following are a few basic questions that cover the essentials of OS: Operating Systems Following are a few basic questions that cover the essentials of OS: 1. Explain the concept of Reentrancy. It is a useful, memory-saving technique for multiprogrammed timesharing systems.

More information

Unit In a time - sharing operating system, when the time slot given to a process is completed, the process goes from the RUNNING state to the

Unit In a time - sharing operating system, when the time slot given to a process is completed, the process goes from the RUNNING state to the Unit - 5 1. In a time - sharing operating system, when the time slot given to a process is completed, the process goes from the RUNNING state to the (A) BLOCKED state (B) READY state (C) SUSPENDED state

More information

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad - 500 043 INFORMATION TECHNOLOGY TUTORIAL QUESTION BANK Course Name Course Code Class Branch OPERATING SYSTEMS ACS007 IV Semester

More information

( B ) 4. Which is not able to solve the race condition? (A) Test and Set Lock (B) Shared memory (C) Semaphore (D) Monitor

( B ) 4. Which is not able to solve the race condition? (A) Test and Set Lock (B) Shared memory (C) Semaphore (D) Monitor CS 540 - Operating Systems - Final Exam - Name: Date: Monday, May 12, 2003 Part 1: (80 + 8 (bonus) points - 4 points for each problem) ( C ) 1. In an operating system a utility which reads commands from

More information

Memory Management. 3. What two registers can be used to provide a simple form of memory protection? Base register Limit Register

Memory Management. 3. What two registers can be used to provide a simple form of memory protection? Base register Limit Register Memory Management 1. Describe the sequence of instruction-execution life cycle? A typical instruction-execution life cycle: Fetches (load) an instruction from specific memory address. Decode the instruction

More information

Operating Systems. Designed and Presented by Dr. Ayman Elshenawy Elsefy

Operating Systems. Designed and Presented by Dr. Ayman Elshenawy Elsefy Operating Systems Designed and Presented by Dr. Ayman Elshenawy Elsefy Dept. of Systems & Computer Eng.. AL-AZHAR University Website : eaymanelshenawy.wordpress.com Email : eaymanelshenawy@yahoo.com Reference

More information

Main Memory. Electrical and Computer Engineering Stephen Kim ECE/IUPUI RTOS & APPS 1

Main Memory. Electrical and Computer Engineering Stephen Kim ECE/IUPUI RTOS & APPS 1 Main Memory Electrical and Computer Engineering Stephen Kim (dskim@iupui.edu) ECE/IUPUI RTOS & APPS 1 Main Memory Background Swapping Contiguous allocation Paging Segmentation Segmentation with paging

More information

I.-C. Lin, Assistant Professor. Textbook: Operating System Concepts 8ed CHAPTER 8: MEMORY

I.-C. Lin, Assistant Professor. Textbook: Operating System Concepts 8ed CHAPTER 8: MEMORY I.-C. Lin, Assistant Professor. Textbook: Operating System Concepts 8ed CHAPTER 8: MEMORY MANAGEMENT Chapter 8: Memory Management Background Swapping Contiguous Memory Allocation Paging Structure of the

More information

12: Memory Management

12: Memory Management 12: Memory Management Mark Handley Address Binding Program goes through multiple steps from compilation to execution. At some stage, addresses in the program must be bound to physical memory addresses:

More information

I/O Handling. ECE 650 Systems Programming & Engineering Duke University, Spring Based on Operating Systems Concepts, Silberschatz Chapter 13

I/O Handling. ECE 650 Systems Programming & Engineering Duke University, Spring Based on Operating Systems Concepts, Silberschatz Chapter 13 I/O Handling ECE 650 Systems Programming & Engineering Duke University, Spring 2018 Based on Operating Systems Concepts, Silberschatz Chapter 13 Input/Output (I/O) Typical application flow consists of

More information

Chapter 8: Memory Management. Operating System Concepts with Java 8 th Edition

Chapter 8: Memory Management. Operating System Concepts with Java 8 th Edition Chapter 8: Memory Management 8.1 Silberschatz, Galvin and Gagne 2009 Background Program must be brought (from disk) into memory and placed within a process for it to be run Main memory and registers are

More information

Virtual Memory. CSCI 315 Operating Systems Design Department of Computer Science

Virtual Memory. CSCI 315 Operating Systems Design Department of Computer Science Virtual Memory CSCI 315 Operating Systems Design Department of Computer Science Notice: The slides for this lecture have been largely based on those from an earlier edition of the course text Operating

More information

I.-C. Lin, Assistant Professor. Textbook: Operating System Principles 7ed CHAPTER 8: MEMORY

I.-C. Lin, Assistant Professor. Textbook: Operating System Principles 7ed CHAPTER 8: MEMORY I.-C. Lin, Assistant Professor. Textbook: Operating System Principles 7ed CHAPTER 8: MEMORY MANAGEMENT Chapter 8: Memory Management Background Swapping Contiguous Memory Allocation Paging Structure of

More information

Chapter 8: Memory Management. Background Swapping Contiguous Allocation Paging Segmentation Segmentation with Paging

Chapter 8: Memory Management. Background Swapping Contiguous Allocation Paging Segmentation Segmentation with Paging Chapter 8: Memory Management Background Swapping Contiguous Allocation Paging Segmentation Segmentation with Paging 1 Background Memory management is crucial in better utilizing one of the most important

More information

COMP 3361: Operating Systems 1 Final Exam Winter 2009

COMP 3361: Operating Systems 1 Final Exam Winter 2009 COMP 3361: Operating Systems 1 Final Exam Winter 2009 Name: Instructions This is an open book exam. The exam is worth 100 points, and each question indicates how many points it is worth. Read the exam

More information

Chapter 8: Virtual Memory. Operating System Concepts

Chapter 8: Virtual Memory. Operating System Concepts Chapter 8: Virtual Memory Silberschatz, Galvin and Gagne 2009 Chapter 8: Virtual Memory Background Demand Paging Copy-on-Write Page Replacement Allocation of Frames Thrashing Memory-Mapped Files Allocating

More information

Chapter 8: Memory Management Strategies

Chapter 8: Memory Management Strategies Chapter 8: Memory- Management Strategies, Silberschatz, Galvin and Gagne 2009 Chapter 8: Memory Management Strategies Background Swapping Contiguous Memory Allocation Paging Structure of the Page Table

More information

(b) External fragmentation can happen in a virtual memory paging system.

(b) External fragmentation can happen in a virtual memory paging system. Alexandria University Faculty of Engineering Electrical Engineering - Communications Spring 2015 Final Exam CS333: Operating Systems Wednesday, June 17, 2015 Allowed Time: 3 Hours Maximum: 75 points Note:

More information

Chapter 5: CPU Scheduling

Chapter 5: CPU Scheduling Chapter 5: CPU Scheduling Basic Concepts Scheduling Criteria Scheduling Algorithms Thread Scheduling Multiple-Processor Scheduling Operating Systems Examples Algorithm Evaluation Chapter 5: CPU Scheduling

More information

1. Consider the following page reference string: 1, 2, 3, 4, 2, 1, 5, 6, 2, 1, 2, 3, 7, 6, 3, 2, 1, 2, 3, 6.

1. Consider the following page reference string: 1, 2, 3, 4, 2, 1, 5, 6, 2, 1, 2, 3, 7, 6, 3, 2, 1, 2, 3, 6. 1. Consider the following page reference string: 1, 2, 3, 4, 2, 1, 5, 6, 2, 1, 2, 3, 7, 6, 3, 2, 1, 2, 3, 6. What will be the ratio of page faults for the following replacement algorithms - FIFO replacement

More information

Operating Systems Comprehensive Exam. Spring Student ID # 2/17/2011

Operating Systems Comprehensive Exam. Spring Student ID # 2/17/2011 Operating Systems Comprehensive Exam Spring 2011 Student ID # 2/17/2011 You must complete all of Section I You must complete two of the problems in Section II If you need more space to answer a question,

More information

Chapter 8 Virtual Memory

Chapter 8 Virtual Memory Chapter 8 Virtual Memory Contents Hardware and control structures Operating system software Unix and Solaris memory management Linux memory management Windows 2000 memory management Characteristics of

More information

B. the address of the data is supplied by the users C. there is no need for an address i.e. the data is used as an address

B. the address of the data is supplied by the users C. there is no need for an address i.e. the data is used as an address 1. The part of machine level instruction, which tells the central processor what has to be done, is A. Operation code B. Address C. Locator D. Flip-Flop 2. Which of the following refers to the associative

More information

MARUTHI SCHOOL OF BANKING (MSB)

MARUTHI SCHOOL OF BANKING (MSB) MARUTHI SCHOOL OF BANKING (MSB) SO IT - OPERATING SYSTEM(2017) 1. is mainly responsible for allocating the resources as per process requirement? 1.RAM 2.Compiler 3.Operating Systems 4.Software 2.Which

More information

Operating System MC Exercises

Operating System MC Exercises Operating System MC Exercises 2010 2011 Rahmat M. Samik Ibrahim et. al. http://rms46.vlsm.org/2/185.pdf Contributors: Rahmat M. Samik Ibrahim (VauLSMorg), Heri Kurniawan (Faculty of Computer Science, University

More information