OPERATING SYSTEM

advertisement
STUDENT IDENTIFICATION NO
MULTIMEDIA COLLEGE
JALAN GURNEY KIRI
54100 KUALA LUMPUR
FIRST, SECOND, THIRD SEMESTER FINAL EXAMINATION, 2014/2015 SESSION
ITC2053/TIS2233 – OPERATING SYSTEM
DSEWE-F-2-/14, DSEW-E-F-1/14, DSEW-E-F-3/14
11 FEBRUARY 2015
9.00 AM – 11.00 AM
(2 HOURS)
INSTRUCTION TO STUDENT
1.
This Examination paper has SEVENTEEN (17) printed pages.
2.
This question paper consists of THREE (3) sections.
3.
Section
A
: Answer ALL questions.
Section
B
: Answer ALL questions.
Section
C
: Answer FIVE (5) questions ONLY.
Please write all your answers in the Answer Booklet provided.
ITC2053/TIS2233
OPERATING SYSTEM
SECTION A
: OBJECTIVE QUESTION (30 MARKS)
INSTRUCTION
: ANSWER ALL QUESTIONS
1.
11 FEBRUARY 2014
Which of the following memory management schemes does NOT allow
multiprogramming?
2.
3.
A.
Single-user contiguous scheme
B.
Fixed partition
C.
Dynamic partition
D.
Relocatable dynamic partitions
Which of the following memory management schemes optimizes fragmentation?
A.
Single-user contiguous scheme
B.
Fixed partition
C.
Dynamic partition
D.
Relocatable dynamic partitions
Given the following static allocation scheme:
Partition
Contents
Size
1
2
3
Operating System
free
free
32K
32K
64K
Where will a job requiring 96K bytes of memory be stored?
A.
Partition 1
B.
Partition 2
C.
Partition 3
D.
None of the above
Continued…
RA
Page 2 of 13
ITC2053/TIS2233
4.
OPERATING SYSTEM
11 FEBRUARY 2014
Consider the case where the Free Memory Storage List is kept in ascending order by
partition size. The attempt to place a job in the smallest free partition in which it will
fit is called______________.
5.
A.
First Fit
B.
Best Fit
C.
Worst Fit
D.
No Fit
The total effect of all CPU cycles, from both I/O-bound and CPU-bound jobs,
approximates which of the following distribution curves?
6.
A.
Gaussian distribution
B.
Poisson distribution
C.
Lorentzian Distribution
D.
Random Distribution
Which of the following algorithms employ the concept of a time quantum that is
given to each job to ensure that the CPU is equally shared among all active processes?
7.
A.
SRT
B.
SJN
C.
Round robin
D.
Priority scheduling
Which of the following conditions results from the liberal allocation of resources?
A.
Starvation
B.
Deadlock
C.
Increased efficiency
D.
Request for more memory
Continued…
RA
Page 3 of 13
ITC2053/TIS2233
8.
OPERATING SYSTEM
11 FEBRUARY 2014
In directed graphs, a solid arrow from a resource to process represents which of the
following?
9.
A.
Process is holding the resource
B.
Process is waiting for the resource
C.
Deadlock
D.
Starvation
Which of the following strategies for handling deadlocks is illustrated using the
Banker’s algorithm?
10.
11.
A.
Prevention
B.
Avoidance
C.
Detection
D.
Recovery
A supercomputer can perform ______________ floating-point operations per second.
A.
240 million
B.
2.4 billion
C.
2.4 trillion
D.
24 trillion
___________ is how memory is deallocated in a fixed partition scheme.
A.
Memory Manager releases the block and combines it with another free block.
B.
Memory Manager immediately gives memory to another program.
C.
Memory Manager adds block to free list and removes it from busy list.
D.
Memory Manager resets the status of the memory block where the job was
stored to “free.”
12.
A system with _______________ divides programs into parts and keep them in
secondary storage, bringing each part into memory only as it is needed.
A.
virtual memory
B.
shared memory
C.
segmented processing
D.
passive multiprogramming
Continued…
RA
Page 4 of 13
ITC2053/TIS2233
13.
14.
15.
OPERATING SYSTEM
11 FEBRUARY 2014
The primary advantage of storing programs in noncontiguous locations is that ____.
A.
multiple programs can run at the same time
B.
every program will be able to run
C.
secondary storage is accessed more quickly
D.
main memory is used more efficiently
The I/O ______________ allocates the devices, control units, and channels.
A.
scheduler
B.
traffic controller
C.
device handler
D.
director
The source code of a Java program is first compiled into an intermediate language
called Java _________, which are platform-independent.
16.
17.
A.
beans
B.
nibs
C.
bits
D.
bytecodes
For ________ systems, deadlocks quickly become critical situations.
A.
batch
B.
interactive
C.
real-time
D.
general purpose
When the operating system detects a non-recoverable error, the following step is
performed first by the interrupt handler : __________________.
A.
the state of the interrupted process is saved
B.
the type of interrupt is described and stored
C.
the interrupt is processed
D.
the processor resumes operation
Continued…
RA
Page 5 of 13
ITC2053/TIS2233
18.
OPERATING SYSTEM
11 FEBRUARY 2014
Failure to lock database records before updating them may result in a _______
between processes.
19.
20.
21.
A.
struggle
B.
race
C.
timeout
D.
livelock
The fixed partition scheme works well ___________________.
A.
when jobs have the same size
B.
when jobs have different sizes
C.
when job sizes are not known in advance
D.
when all jobs are under 100K
_________ means that several logical records are grouped within one physical record.
A.
Grouping
B.
Fixing
C.
Combining
D.
Blocking
_____systems are computer placed inside other products to add features and
capabilities.
22.
A.
Hybrid
B.
Embedded
C.
Real-Time
D.
Interactive
________includes every peripheral unit in the system such as printers, disk drives,
CD/DVD drives, flash memory, keyboards, and so on.
A.
The CPU
B.
Processors
C.
I/O Devices
D.
Memory
Continued…
RA
Page 6 of 13
ITC2053/TIS2233
23.
OPERATING SYSTEM
11 FEBRUARY 2014
Which of the following memory management techniques that leads to internal
fragmentation?
I.
Single-user Contiguous
II. Fixed Partition
III. Dynamic Partition
IV. Relocatable Dynamic Partition
24.
A.
I, II
B.
II, III
C.
III, IV
D.
I, IV
The most common mechanism for implementing multiprogramming was the
introduction of the _______ concept, which is when the CPU is notified of priority
events needing operating systems services.
25.
26.
A.
Interrupt
B.
Messaging
C.
Paging
D.
Sharing
_____ devices are assigned to only one job at a time.
A.
Dedicated
B.
Virtual
C.
Shared
D.
Static
The purpose of a file extension is to __________________________.
A.
identify the directory in which the file is stored
B.
identify the type of file
C.
identify the file size
D.
identify the file owner
Continued…
RA
Page 7 of 13
ITC2053/TIS2233
27.
28.
OPERATING SYSTEM
11 FEBRUARY 2014
A page size that is too small will generate __________________________.
A.
very long PMTs
B.
excessive internal fragmentation
C.
more difficult to calculate actual position
D.
excessive external fragmentation
The Processor Scheduler assigns the CPU to execute the processes of those jobs
placed on the ___________ state by the Job Scheduler.
29.
A.
WAITING
B.
PROCESS
C.
NEXT
D.
READY
With demand paging, jobs are divided into equally sized _______ that initially reside
in secondary storage.
30.
A.
pages
B.
frames
C.
blocks
D.
sets
The fixed partition scheme works well when ______________________.
A.
jobs have the same size
B.
jobs have different sizes
C.
job sizes are not known in advance
D.
all jobs are under 100K
Continued…
RA
Page 8 of 13
ITC2053/TIS2233
OPERATING SYSTEM
SECTION B
: TRUE (T) OR FALSE (F) (20 MARKS)
INSTRUCTION
: ANSWER ALL QUESTIONS
1.
11 FEBRUARY 2014
After a job has been placed on the READY queue by the Job Scheduler, the Process
Scheduler takes over.
2.
CPU-bound jobs (such as printing a series of documents) have many brief CPU
cycles and long I/O cycles.
3.
As a job moves through the system it is always in one of five states (or at least three);
these are called the job status or the process status.
4.
Each job is uniquely identified by the user’s identification and a pointer connecting it
to its descriptor.
5.
The shortest remaining time (SRT) algorithm is often used in interactive systems.
6.
If locks are not used to preserve data integrity, the updated records in a database
might include only some of the data—and their contents would depend on the order
in which each process finishes its execution.
7.
A race introduces the element of chance, an element that is desirable in database
management.
8.
A deadlock is preceded by six simultaneous conditions that the operating system
could have recognized.
9.
When modeling deadlock, if there’s a cycle in the graph, then there is a deadlock
involving the processes and the resources in the cycle.
10.
Mutual exclusion should be eliminated from a computer system to avoid deadlock.
Continued…
RA
Page 9 of 13
ITC2053/TIS2233
OPERATING SYSTEM
11 FEBRUARY 2014
11.
The Memory Manager is in charge of main memory, also known as ROM.
12.
The high-level portion of the Process Manager is called the Process Scheduler.
13.
The Device Manager monitors every device, channel, and control unit.
14.
The supercomputer was developed primarily for government applications needing
massive and fast number-crunching ability to carry out military operations and
weather forecasting.
15.
If the control unit has two buffers, the second buffer can be loaded while the first
buffer is transmitting its contents to or from the CPU.
16.
Most systems have transformed the printer into a sharable device that uses high-speed
storage to transfer data between it and the CPU.
17.
The operating system must be sure never to satisfy a request that moves it from a safe
state to an unsafe one.
18.
Although the Banker’s Algorithm has been used to avoid deadlocks in systems with a
few resources, it isn’t always practical for most systems.
19.
Starvation is the result of the liberal allocation of resources.
20.
Once starvation has been detected, an algorithm can be implemented in which the
system blocks new jobs until the starving jobs have been satisfied.
Continued…
RA
Page 10 of 13
ITC2053/TIS2233
OPERATING SYSTEM
SECTION C :
INSTRUCTION
11 FEBRUARY 2014
SHORT QUESTION (50 MARKS)
:
ANSWER FIVE (5) QUESTIONS ONLY.
Question 1
Provide the definition of the term below:
a)
Best-fit memory allocation
b)
First-fit memory allocation
c)
Compaction
d)
Deallocation
e)
Dynamic partitions
(10 Marks)
Question 2
a)
What is a computer system?
(2 Marks)
b)
What is an operating system?
(2 Marks)
c)
List TWO (2) example of operating system.
(2 Marks)
d)
List TWO (2) types of the operating system
(2 Marks)
e)
Provide TWO (2) managers/components in operating system.
(2 Marks)
Question 3
a)
Explain the first-in first-out (FIFO) and least-recently-used (LRU) page replacement
policies.
(4 Marks)
b)
Provide ONE(1) advantage and ONE(1) disadvantage of Paged Memory Allocation
(4 Marks)
c)
What is cache memory?
(2Marks)
Continued…
RA
Page 11 of 13
ITC2053/TIS2233
OPERATING SYSTEM
11 FEBRUARY 2014
Question 4
Given that main memory is composed of three page frames for public use and that a program
requests pages in the following order:
a, d, b, a, f, b, e, c, g, f, b, g
a)
Using the First-In First-Out (FIFO) page removal algorithm, perform a page trace
analysis indicating page faults with asterisks (*). Then compute the failure and
success ratios.
Page request
a
d
b
a
f
b
e
c
g
f
b
g
Page fault
Page frame 1
Page frame 2
Page frame 3
(5 Marks)
b)
Using the Least Recently Used (LRU) page removal algorithm, perform a page trace
analysis indicating page faults with asterisks (*). Then compute the failure and
success ratios.
Page request
a
d
b
a
f
b
e
c
g
f
b
g
Page fault
Page frame 1
Page frame 2
Page frame 3
(5 Marks)
Question 5
a)
What is deadlock?
(2 Marks)
b)
State and explain FOUR (4) situations that caused a deadlock.
(8 Marks)
Continued…
RA
Page 12 of 13
ITC2053/TIS2233
OPERATING SYSTEM
11 FEBRUARY 2014
Question 6
Based on the following information:
Memory
Memory
Job
Status
Internal
External
Block
Block Size
No
Busy/Free
Fragmentation
Fragmentation
Block 1
500 K
Block 2
300 K
Block 3
900 K
Incoming Job list:
Job 1 (850 K)
Job 2 (150 K)
Job 3 (600 K)
a)
Use the follows algorithm to indicate which memory blocks are allocated to each of
the 3 (THREE) arriving jobs. Calculate the internal and external fragmentation.
i)
Best-fit algorithm
ii)
First-fit algorithm
iii)
Worst-fit algorithm
(9 Marks)
b)
From the three algorithm which is the most suitable algorithm.
(1 Marks)
End of Page.
RA
Page 13 of 13
Download