You are on page 1of 6

Universiti

Malaysia
PAHANG
Engineering . Technology . Creativity
FACULTY OF COMPUTER SYSTEMS & SOFTWARE ENGINEERING
FINAL EXAMINATION
COURSE
: OPERATING SYSTEM
COURSE CODE: BCN2053
LECTURER: IMRAN EDZEREIQ KAMARUDIN
ZARINA DZOLKHIFLI
DATE
: 17 JUNE 2O13
DURATION
: 3 HOURS
SESSION/SEMESTER : SESSION 2012/2013 SEMESTER II
PROGRAMME CODE :
BCNIBCS/BCG
INSTRUCTIONS TO CANDIDATE:
1. This question paper consists of Four (4)
questions. Answer ALL questions.
2.
Write your answers in the answer booklet provided.
3.
Answer EACH question on a new page.
4.
All calculations and assumptions must be clearly shown. Calculator is allowed
EXAMINATION REQUIREMENTS:
NONE
DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SO
This examination paper consists of
Six (6) printed pages including the front page.
CONFIDENTIAL

BCN/BCS/BCG/121311/BCN2053
[80 MARKS]
QUESTION 1

[20 Marks]
a)
Explain the impact of the evolution of computer hardware and the accompanying evolution
of operating systems software.
[4 Marks]
b)
Distinguish the main differences between operating systems for mainframe computers and
personal computers?
[2 Marks]
c)
Compare and contrast internal fragmentation and external fragmentation. Explain the
circumstances where one might be preferred over the other.
[4 Marks]
d) Given the following information
Job List:
Job number
Memory Requested Memory Block
Memory Block Size
Job 1 275K Block 1
900K
Job 920K
Block 2
910K
Job 3
690K
Block 3 300K
i. Using the first-fit algorithm, indicate which memory blocks are allocated to each of the
three arriving jobs. Investigate and calculate the internal fragmentation base on the
allocation algorithm
[4 Marks]
2
CONFIDENTIAL

BCN/BCS/BCG/121311/BCN2053
ii.Using the best-fit algorithm, indicate which memory blocks are allocated to each of the
three arriving jobs.Investigate and calculate the outcome base on the allocation algorithm
[4 Marks]
iii.Based on the findings above, which algorithm is more efficient? Explain you answer
[2 Marks]
QUESTION 2

[20 Marks]
a) Given that main memory is composed of three page frames for public use and that a program
requests pages in the following order:
a, b, c, d, b, e, b, f, d, e
i.Using the FIFO page removal algorithm, illustrate a page trace analysis indicating
page faults with asterisks (*).Analyze and compute the failure and success ratios.
[3 Marks]
ii.

Using the LRU page removal algorithm, illustrate a page trace analysis indicating
page faults with asterisks (*).Analyze and compute the failure and success ratios.
[3 Marks]
b) Process is defined as program in execution.Illustrate FIVE (5) process state and explain what
happen to a process in that particular state
[5 Marks]
3
CONFIDENTIAL

BCN/BCS/BCG/1213111BCN2053
c) Given the following information:
Job
Arrival Time
CPU cycle
A 0
12
B 0
14
C
2
5
D
3
3
E 6
16
With the relevant Gantt chart, analyze and calculate the average waiting and average
turnaround time of the system in accordance to:
i. Non preemptive SJF algorithm
ii. Preemptive SJF algorithm
iii. Round Robin (Time Quantum =6)
QUESTION 3
Figure 1
4
[9 Marks]
[20 Marks]
CONFIDENTIAL

BCN/BCS/BCG/121311/BCN2053
a) Analyze the directed resource graph shown in Figure 1 above, and answer the following
questions.
i.
What is the status of the system if the request by P2 is granted before that ofPl?
ii.
What is the status of the system if the request by P1 is granted before that of P2?
[4 Marks]
b) Describe how primary storage differs from secondary storage.
[2 Marks]
c) Is there any way to implement truly stable storage? Explain your answer with an example.
[5 Marks]
d) Suppose that a disk drive has 200 cylinders, numbered 0 to 199. The drive is currently
serving a request at cylinder 98. The queue of pending request in FIFO order is:
981833712214 124 6567
Starting from the current head position, illustrate and analyze by calculating the total distance
(in cylinders) that the disk arm moves to satisfy all the pending requests for each of the
following disk-scheduling algorithms
(i) SSTF
(ii) SCAN (assuming arm movement towards the end of disk)
(iii)
C-SCAN (assuming arm movement towards the beginning of disk)
[9 Marks]
5
CONFIDENTIAL
BCN/BCSIBCG/121311/BCN2053
QUESTION 4

[20 Marks]
a) Distinguish the differences between CSMA/CD and CSMAICA. Provide one example for
each access control technique.
[6 Marks]
b) A file name 'finalexam' was created earlier by user fskkp with the following attributes as
below
-rwx------2fskkp ump 2048Jan 21013finalexam
i.
A new user, Abu, from ump group was trying to view the content of finalexam file
but was denied. Investigate and provide a solution so that he can view the content of
the file.
[2Marks]
ii. To modify the content of finalexam file, Abu tried to edit vi VI editor but was denied
when trying to save the modification. Investigate what is the problem.
[2Marks]
c) Many users are required to log into several networks and thus have multiple passwords,
which are difficult to remember. List THREE (3) ways that a user can manage these
password requirements and compare the advantages and disadvantages of each.
[6 Marks]
d) Imagine that you are an unauthorized user who wants to break into a system. Analyze and
describe how you might begin guessing the password of a legitimate user.
[4 Marks]
END OF QUESTION PAPER