operating system

STUDENT IDENTIFICATION NO
UNIVERSITI MALAYSIA SARAWAK
94300 KOTA SAMARAHAN
SARAWAK
FAKULTI SAINS KOMPUTER & TEKNOLOGI MAKLUMAT
(Faculty of Computer Science & Information Technology)
Diploma in Multimedia Technology
FIRST, EIGHT SEMESTER FINAL EXAMINATION, 2013/2014 SESSION
ITC2053 – OPERATING SYSTEM
DMTQ-E-F-1/11, DSEW-E-F-2/13
20 FEBRUARY 2014
2.00 PM – 4.00 PM
(2 HOURS)
______________________________________________________________________
INSTRUCTION TO STUDENT
1.
This Examination paper has FOURTEEN (14) printed pages.
2.
This question paper consists of THREE (3) sections.
3.
Section
A
: Answer ALL questions
Section
B
: Answer ALL questions
Section
C
: Answer SIX (6) questions ONLY.
Please write all your answers in the Answer Booklet provided.
ITC2053
OPERATING SYSTEM
SECTION A
:
OBJECTIVE QUESTIONS (20 MARKS)
INSTRUCTION
:
ANSWER ALL QUESTIONS
1.
2.
20 FEBRUARY 2014
____ means that several logical records are grouped within one physical record.
A.
Grouping
B.
Fixing
C.
Combining
D.
Blocking
A(n) ____ in the busy list occurs when a memory block between two other busy
memory blocks is returned to the free list.
3.
4.
A.
blank line
B.
null entry
C.
joined entry
D.
empty entry
There are ____ entries per page in the PMT.
A.
0
B.
1
C.
2
D.
5
A page size that is too small will generate ____.
A.
very long PMTs
B.
excessive internal fragmentation
C.
more difficult to calculate actual position
D.
excessive external fragmentation
Continued…
__________________________________________________________________________________________________________
MFAH
Page 2 of 14
ITC2053
5.
OPERATING SYSTEM
20 FEBRUARY 2014
When selecting the proper time quantum it should be long enough to allow ____
percent of the CPU cycles to run to completion.
6.
A.
20
B.
60
C.
80
D.
100
Internal interrupts, or ____ interrupts, also occur as a direct result of the
arithmetic operation or job instruction currently being processed.
7.
8.
A.
I/O
B.
illegal job instruction
C.
illegal operation
D.
synchronous
A ____ of processing must be handled as a unit.
A.
line
B.
Segment
C.
critical region
D.
semaphore
Operations on semaphore s enforce the concept of ____, which is necessary to
avoid having two operations attempt to execute at the same time.
A.
mutual execution
B.
mutex execution
C.
signal exclusion
D.
mutual exclusion
Continued…
__________________________________________________________________________________________________________
MFAH
Page 3 of 14
ITC2053
9.
OPERATING SYSTEM
20 FEBRUARY 2014
A thread transitions from RUNNING to ____ when it has to wait for an event
outside its control to occur.
10.
A.
LOOPING
B.
BLOCKED
C.
WAITING
D.
PENDING
The number of characters that can be recorded per inch on a magnetic tape is
determined by the ____ of the tape.
11.
A.
Width
B.
Length
C.
Density
D.
parity
It takes 2.5 minutes to reach the last record on a tape, ____ is the average access
time.
12.
A.
5 minutes
B.
1 minute
C.
1.25 minutes
D.
2 minutes
To write data to flash memory, an electric charge is sent through one transistor,
called the ____, then through a metal oxide layer, and into a second transistor
called the control gate where the charge is stored in a cell until it’s erased.
A.
parallel port
B.
floating gate
C.
pit
D.
crystalline port
Continued…
__________________________________________________________________________________________________________
MFAH
Page 4 of 14
ITC2053
13.
OPERATING SYSTEM
20 FEBRUARY 2014
Without DMA, the ____ is responsible for the physical movement of data
between main memory and the device.
14.
15.
16.
A.
CPU
B.
Bus
C.
memory controller
D.
disk
The most commonly used access control scheme is the ____.
A.
access control matrix
B.
access control list
C.
capability list
D.
capability matrix
____ is a popular option for still images and ____ for video images
A.
ANSI, MPEG
B.
ISO, CGI.
C.
JPEG, VPEG
D.
JPEG, MPEG
The ____ file function causes the DO/S File Manager to use a master directory
with information about all files stored anywhere on the system and set up a
channel to the file.
A.
Find and Open
B.
Read
C.
Write
D.
Create
Continued…
__________________________________________________________________________________________________________
MFAH
Page 5 of 14
ITC2053
17.
OPERATING SYSTEM
20 FEBRUARY 2014
Trash collection, also known as ____, is an evening pastime for those who enjoy
perusing anything and everything thrown out by system users.
18.
A.
dumpster diving
B.
Recycling
C.
dumpster surfing
D.
trash surfing
Using ____, a firewall reviews the header information for incoming and outgoing
Internet packets to verify that the source address, destination address, and
protocol are all correct.
19.
A.
Snooping
B.
packet filtering
C.
a proxy server
D.
anti-virus software
A ____ server hides important network information from outsiders by making the
network server invisible.
A.
Redirection
B.
Blocking
C.
Proxy
D.
fire
Continued…
__________________________________________________________________________________________________________
MFAH
Page 6 of 14
ITC2053
20.
OPERATING SYSTEM
20 FEBRUARY 2014
Assume that a system consisting of CPU 1 and Disk Drive A (access speed 35
ms) has to access Track 1, Track 9, Track 1, and then Track 9, and that the arm is
already located at Track 1. Without reordering, Drive A requires ____ to complete
the access.
A.
30 ms
B.
35 ms
C.
70 ms
D.
105 ms
Continued…
__________________________________________________________________________________________________________
MFAH
Page 7 of 14
ITC2053
OPERATING SYSTEM
SECTION B
:
TRUE (T) OR FALSE (F) (20 MARKS)
INSTRUCTION
:
ANSWER ALL QUESTIONS
20 FEBRUARY 2014
1.
Until the mid-1970s, all computers were classified by price alone.
2.
Since the mid-1970s rapid advances in computer technology have blurred the
distinguishing characteristics of early machines.
3.
Research continues to focus on finding the optimum allocation scheme.
4.
To move in a new page, a resident page must be swapped back into primary
storage.
5.
A process is an inactive unit, such as a file stored on a disk.
6.
Each job is uniquely identified by the user’s identification and a pointer
connecting it to its descriptor.
7.
It is easy to design a foolproof deadlock prevention policy.
8.
In parallel computations, mutual exclusion is achieved automatically because each
operation is handled in order, one at a time.
9.
The problem of masters and slaves arises when two types of processes need to
access a shared resource such as a file or database.
10.
When using DMA, the CPU is involved in transferring data to and from memory
for the entire transfer.
Continued…
__________________________________________________________________________________________________________
MFAH
Page 8 of 14
ITC2053
11.
OPERATING SYSTEM
20 FEBRUARY 2014
The SCAN algorithm moves the arm methodically from the inner to the outer
track, servicing every request in its path.
12.
In a file management system, information is passed from the Device Manager at
the top of the hierarchy to the File Manager at the bottom.
13.
Data in a fixed-length field might include a short name followed by many blank
characters; it can be replaced with a variable-length field and a special code to
indicate how many blanks were truncated.
14.
The network operating system handles the interfacing details and coordinates the
remote processing.
15.
Each kernel is operated by the application software which, in turn, is directed by
the kernel running on the host computer.
16.
A single computer without access to e-mail or the Internet is easy to protect and
has a low risk of attack.
17.
Wire tapping is when unauthorized users gain the capability to search through
storage, directories, or files for information they aren’t privileged to read.
18.
A continuing series of security awareness and ethics communications to computer
users is more effective than a single announcement.
19.
The performance of each system resource is independent of any other resource.
20.
Any system improvement can be made only after extensive analysis of the needs
of the system’s resources, requirements, managers, and users.
Continued…
__________________________________________________________________________________________________________
MFAH
Page 9 of 14
ITC2053
OPERATING SYSTEM
SECTION C
:
LONG QUESTIONS (60 MARKS)
INSTRUCTION
:
ANSWER SIX (6) QUESTIONS ONLY.
20 FEBRUARY 2014
Question 1
Name FIVE (5) current operating systems and the computers or configurations each
operates.
(10 Marks)
Question 2
Explain the fundamental differences between internal fragmentation and external
fragmentation. For each of the four memory management systems (single user, fixed,
dynamic, and relocatable dynamic), identify which one causes each type of
fragmentation.
(10 Marks)
Question 3
a)
Compare and contrast internal fragmentation and external fragmentation. Explain
the circumstances where one might be preferred over the other.
(3 Marks)
b)
Describe how the function of the Page Map Table (PMT) differs in paged versus
segmented/demand paging memory allocation.
(3 Marks)
Continued…
__________________________________________________________________________________________________________
MFAH
Page 10 of 14
ITC2053
c)
OPERATING SYSTEM
20 FEBRUARY 2014
Using a paged memory allocation system with a page size of 2,048 bytes and an
identical page frame size, and assuming the incoming data file is 25,600 bytes,
calculate how many pages will be created by the file. Calculate the size of any
resulting fragmentation. Explain whether this situation will result in internal
fragmentation, external fragmentation, or both.
(4 Marks)
Question 4
a)
Describe context switching in lay terms and identify the process information that
needs to be saved, changed, or updated when context switching takes place?
(3 Marks)
b)
Five jobs (A, B, C, D, E) are already in the READY queue waiting to be
processed. Their estimated CPU cycles are respectively: 2, 10, 15, 6, and 8. Using
SJN, in what order should they be processed?
(3 Marks)
c)
A job running in a system, with variable time quantums per queue, needs 30
milliseconds to run to completion. If the first queue has a time quantum of 5
milliseconds and each queue thereafter has a time quantum that is twice as large
as the previous one, how many times will the job be interrupted and on which
queue will it finish its execution?
(4 Marks)
Continued…
__________________________________________________________________________________________________________
MFAH
Page 11 of 14
ITC2053
OPERATING SYSTEM
20 FEBRUARY 2014
Question 5
Give one “real life” examples (not related to a computer system environment) of each
of these concepts: deadlock, starvation, and race.
(10 Marks)
Question 6
a)
Compare the processors’ access to printers and other I/O devices for the
master/slave and the symmetric multiprocessing configurations. Give a real-life
example where the master/slave configuration might be preferred.
(5 Marks)
b)
Compare the processors’ access to main memory for the loosely coupled
configuration and the symmetric multiprocessing configurations. Give a real-life
example where the symmetric configuration might be preferred.
(5 Marks)
Question 7
a)
Describe how primary storage differs from secondary storage.
(5 Marks)
b)
Explain the differences between buffering and blocking.
(5 Marks)
Continued…
__________________________________________________________________________________________________________
MFAH
Page 12 of 14
ITC2053
OPERATING SYSTEM
20 FEBRUARY 2014
Question 8
a)
Is device independence important to the File Manager? Why or why not. Describe
the consequences if that were not the case.
(5 Marks)
b)
Do you think file retrieval is different on a menu-driven system and a commanddriven system? Explain your answer and describe any differences between the
two. Give an example when each user interface would be preferred over the other.
(5 Marks)
Question 9
a)
Explain the role of routers when moving data from one host to another in the
same network.
(2 Marks)
b)
This chapter described packet routing. Explain the two ways in which packets can
be routed and how they differ.
(4 Marks)
c)
Give two real-life examples where packet switching would be preferred over
circuit switching and explain why.
(4 Marks)
Continued…
__________________________________________________________________________________________________________
MFAH
Page 13 of 14
ITC2053
OPERATING SYSTEM
20 FEBRUARY 2014
Question 10
a)
List three benefits of data redundancy as described in this chapter.
(6 Marks)
b)
Describe in detail how a DO/S protects a file from access or modification by an
unauthorized user. Compare it to NOS file protection.
(4 Marks)
Question 11
a)
Give three examples of excellent passwords and explain why each would be a
good choice to protect a system from unauthorized users.
(5 Marks)
b)
Give three advantages and disadvantages of password generator software. Would
you recommend the use of such software for your own system? Explain why or
why not.
(5 Marks)
End of Page.
__________________________________________________________________________________________________________
MFAH
Page 14 of 14