Professional Documents
Culture Documents
2. A protocol that includes the network layer information and can be forwarded is referred to as which
of following?
Answer
1. 2. 3. 4. 5. 6. 7. 8. 9. 10.
1. At track ball requires frequent cleaning because it pick up oil from fingers and dust from the
environment.
2. One Giga means one million
3. A chip-for-chip upgrade requires you to remove the existing processor chip and replace it with a
new one.
4. The translation look aside buffer is a software data structure that supports the virtual memory
address translation operation.
5. An I/O port typically consists of four registers.
6. Many operating systems uses interrupt mechanism for virtual memory paging, a page fault
exception that raises interrupt.
7. The controller can be hold to replace each bad sector logically with one of the spare sectors is called
forwarding.
8. The size of page in Window NT is 4kb.
9. A variety of disk-organization techniques, collectively called redundant arrays of inexpensive disk,
are commonly used to address the performance are reliability issues.
10. The process in a distributes system may vary in size and function. They may include small
microprocessors, workstations, minicomputers and large general purpose computer system.
Answer
1. 2. 3. 4. 5. 6. 7. 8. 9. 10.
True False False True True True False True True True
2. Round robin algorithm has less response time then first come first serve.
4. Amount of internal fragmentation in best fit partition select on algorithm is less than that
of worst fit.
6. Access list of a file contains address of memory that a file can access.
Answer
1. 2. 3. 4. 5. 6. 7. 8. 9. 10.
False False True True False True False False True True
3. System with very small page table use associative memory (or Transition Look Aside buffer)
6. When we compare computational times first fit partition selection algorithm is better than best
10. In mesh topology every device has a point to point link with every other device.
Answer
1. 2. 3. 4. 5. 6. 7. 8. 9. 10.
True True False True False True True True False True
3. Binary semaphore is a semaphore whose count may only take on the value 1 or 0.
4. Overlaying does not allow a process to execute despite the system having insufficient physical
memory
5. In preemptive scheduling a process retained control of the CPU until the process blocked or
terminate.
8. Security and privacy are less issue for devices in a mesh topology.
9. LAN is a data communication system within a building or campus or between nearby buildings.
10. The transport layer coordinates the functions required to transmit a bit stream over a physical
medium.
Answer
1. 2. 3. 4. 5. 6. 7. 8. 9. 10.
True False True False False False False False True False
b. Less susceptible to noise from other devices d. Better security for signals during
transmission
3. Which of the following OSI layer performs the function of encoding and decoding?
a. Network b. Data Link c. Presentation d. Transport
4. Which of the following OSI layer is closest to the transmission medium?
a. Transport b. Physicals c. Data Link d. Network
5. Which topology requires a central controller or hub?
a. Mesh b. Star c. Bus d.Ring
6. Swap instruction is executed atomically
a. True b. False
7. A process is in running state if it is waiting for some events to occur before it can continue
executing.
a. True b. False
8. In non preemptive scheduling the scheduler may preempt a process before it blocks or
terminate
a. True b. False
9. First-Come-first served algorithm is non preemptive
a. True b. False
10. Round robin is used extensively in time sharing systems.
a. True ` b. False Prepared BY Prof .M.A Khan Punjab Group of college campus # 8
Answer
1. 2. 3. 4. 5. 6. 7. 8. 9. 10.
Answer
1. 2. 3. 4. 5. 6. 7. 8. 9. 10.
7. A ___________ is the communication pathway that transfer data from one devise to another.
a. 3 b. 5 c. 6 d. None of them
10. In _______ transmission, the channel capacity is shared by both communicating device at all times.
Answer
1. 2. 3. 4. 5. 6. 7. 8. 9. 10.
Answer
1. 2. 3. 4. 5. 6. 7. 8. 9. 10.
3. Computer Network is
a. Collection of hardware components and computers. c. Interconnected by communication channels
b. Sharing of resources and information d. All of the above.
5. The time taken by the risk arm to locate the specific address of a sector of getting information is
called.
a. Rotational Latency b. Seek Time c. Search Time d. Response Time.
6. Which technique was introduced because a single job could not keep both the CPU and the L/O
devices busy?
a. Time sharing b. Spooling c. Preemptive scheduling d. Multiprogramming.
8. PCB =
a. Program Control Block b. Process Control Block c. Process Communication Block d. None of them
Answer
1. 2. 3. 4. 5. 6. 7. 8. 9. 10.
2. A process is in a _____state if the process has been created but will not be considered for loading into
memory or for execution.
4. On a system that uses simple paging, memory is divide into fixed size blocks called page frame.
5. On some system when a parent process terminates all its children terminated a process known as
____________.
a. Cascading termination b. Dependent termination c. Auto termination d. Inner termination
6. If all processes selected by long term scheduler are I/O bound then the device queue will almost
always be empty.
9. Coaxial cable carries signal of higher frequency ranges than ....... cable
a. Light emission diode b. Laser crystal diode c. Light exile direction d. Laser emitting direction
Prepared BY Prof .M.A Khan Punjab Group of college campus # 8
Answer
1. 2. 3. 4. 5. 6. 7. 8. 9. 10.
Answer
1. 2. 3. 4. 5. 6. 7. 8. 9. 10.
Answer
1. 2. 3. 4. 5. Prepared BY Prof .M.A Khan Punjab Group of college campus # 8
6. 7. 8. 9. 10.
Answer
Prepared BY Prof .M.A Khan Punjab Group of college campus # 8
1. 2. 3. 4. 5. 6. 7. 8. 9. 10.
B) Kernel is the first part of operating system to load into memory during booting
C) Kernel is made of various modules which cannot be loaded in Tuning operating system
D) Kernel remains in the memory during the entire computer session
8. Coaxial cable carries signals of higher frequency ranges than ............... cable
A) Twisted-pair B) Optical Fiber C) Twisted Fiber D) Fiber Pair
9. What is the meaning of Bandwidth in Network?
A). Transmission capacity of a communication channels
B). Connected Computers in the Network
C). Class of IP used in Network
D). None of Above
10. Which topology features a point-to-point line configuration?
A) Mesh B)Ring C) Star D) All of them
Answer
1. 2. 3. 4. 5. 6. 7. 8. 9. 10.
Answer
1. 2. 3. 4. 5. 6. 7. 8. 9. 10.
3. Ina batch environment a new process is created in response to the submission of a job
A) True B) False C) Statement is not clear
4. The physical communication pathway that transfers data from-one device to another.
A) Node B) Link C) Point D) None of them
5. A process is in a Running state, if it is not allocated to a CPU but is ready to run.
A) True B) False C) Statement is not clear
6. Which layer links the network support layers and user support layers?
A) Session layer B) Data link layer
C) Transport layer D) Network layer
7. In______ OS, the response time is very critical.
A) Multitasking B) Batch C) Online D) Real-time
9. Which technique was introduced because a single job could not keep both the CPU and
the I/O devices busy?
A) Time-sharing B) Spooling C) Preemptive scheduling D) Multiprogramming
10. An optimal scheduling algorithm in terms of minimizing the average waiting time of a
given set of processes is __ .
A) FCFS scheduling algorithm B) Round robin scheduling algorithm
C) Shortest job- first scheduling algorithm D) None of the above
Answer
1. 2. 3. 4. 5. 6. 7. 8. 9. 10.
1. In ____ transmission, the channel capacity is shared by both communicating devices all the
time .
A) Simplex B) Half-duplex C) Full-duplex D) Halt-simplex
2. Which of the following scheduler is invoked on an 1/O interrupt
A) Long term scheduler B) Medium term scheduler
C) Short term scheduler D) None of them
3. One method for reducing internal fragmentation is to use partitions of different sizes.
A) True B) False C) Statement is not clear
4. On interactive systems, the average time it takes the system to start responding to user
inputs is Called______.
A) Response time B) Turnaround time C) Wait time D) None of them
5. When a process is created, the operating system must create a PCB for that process.
A) True B) False C) Statement is not clear
6. A______ process is one that shares information with or controls the sequence of instructions
executed by another process.
A) Shared B) Integrating C) Cooperating D) Binding
7. An interrupt is an event generated by the CPU and control goes to the Operating
System
Answer
1. 2. 3. 4. 5. 6. 7. 8. 9. 10.
7. An interrupt is an event generated by the CPU and control goes to the Operating
System.
A. True B. False C. Statement is not clear
8. Round Robin (RR) is preemptive process scheduling algorithm.
Answer
1. 2. 3. 4. 5. 6. 7. 8. 9. 10.
1. The System average period of time which it takes a process to execute is called a ...
A) Response time B) Turn round time C) Wait time D) None of them
2. In bus topology, there is a single cable to which all the network nodes are connected. So,
whenever a node tries to send a message or data to other nodes, this data passes through all
other nodes in the network.
A) True B) False C) Statement is not clear
3. This layer is an addition to OSI model when compared with TCP IP model
A) Application layer B) Presentation layer
C) Session layer D) Both Session and Presentation layer
4. The functionalities of presentation layer includes
A) Data compression B) Data encryption
C) Data description D) All of them
5. Information about a process is maintained in a
A) Stack B) Translation Look aside Buffer
C) Process Control Block D) Program Control Block
6. The state of a process is defined by:
A) The final activity of the process B) The activity just executed by the process
C) The activity to next be executed by the process D) The current activity of the process
7. Ina time-sharing operating system, when the time slot given to a process is completed, the
process goes from the running state to the:
A) Blocked state B) Ready state C) Suspended state D) Terminated state
Answer
1. 2. 3. 4. 5. 6. 7. 8. 9. 10.
10. A. is the physical communication pathway that transfers data from one device to
another.
a. Node b. Link c. point d. none of them
Answer
1. 2. 3. 4. 5. 6. 7. 8. 9. 10.
Answer
1. 2. 3. 4. 5. 6. 7. 8. 9. 10.
Answer
1. 2. 3. 4. 5. 6. 7. 8. 9. 10.
OR
Question no 1) Write down the short note on deadlock with respect to operating system (5marks)
a) Explain the following terms: Prepared BY Prof .M.A Khan Punjab Group of college campus # 8
OR
Question no . 3 b) Briefly explain the following components of the data communication system: (5marks)
1. Message (2.5)
2. Sender (2.5)
OR
Question no . 4 b) Write a short note on segmentation with respect to operating systems? (5marks)
(a) WAN
(a) Briefly explain the function of the following layers of OSI model
Question no . 6 a) Write a short note on the following and draw the diagram also (5marks)
a. Draw a diagram showing the five common process states and the transitions among them. Be sure to
label all states and transitions.
a. Write down the necessity of file management system and explain reason of disk fermentation
b. What do mean by cache memory and how it’s different from RAM?
(5marks)
a. Write down the difference between hierarchical and relational data model with the help of an
example.
a. You are trying to install a network card into a computer with the following hardware: COM1,
COM2, LPT1, PS/2 mouse, and an IDE hard drive controller. The NIC supports IRQ(s) 3, 4, 5, 7
and 10. Which IRQ(s) could you use?
b. What is the difference between HUB and SWITCH? Describe with examples.
OR
Question no.1 b. Following tables show a set of processes with arrival time and CPU bursts
calculate (a) Waiting time for each process (b) Average Response Time (c)
Turnaround time; by applying.
i. Round robin Algorithm with Time Quantum (3)
ii. Shortest Remaining Time. (2)
P1 0 7
P2 2 5
P3 4 2
P4 6 3
P5 9 6
\
a 1. Monitors (2)
OR
request if page is in memory. If the page is not in memory, the request take 5 ms.
OR
b. What is magnetic disk? Explain how data are stored and organized on magnetic disk.
a) Write down the different states of a process and briefly explain each one.
b) Write a note on priority Scheduling.
a) If logical address is of 32 bits and page size is 1212 bytes .then how many bits are reserved
for page numbers.
b) Write in detail about fragmentation.
Effective bandwidth
Twisted pair cable
Prepared BY Prof .M.A Khan Punjab Group of college campus # 8
Session layer
Question no 1(b) Following shown the set of processes with arrival time and processing draw the Gantt
chart illustrating their exaction using shortest job and calculate average witting time using shortest job first .
(3+3.5)
Star topology
Half topology
WAN
Question no 2(b) Define the deadlock . what are the possible technique to manage deadlock ? what is different
deadlock prevention and deadlock detection . (6.5)
Question no 3(a) what are the main function provided by a file system . (6.0)
Question no 2(a) Discuss “overlays” memory management scheme also discuss one disadvantages of this
scheme . (6.5)
Question no 3(a) Discuss the functions of physical layer in OSI model . (6.0)
Question no 3(b) Differentiate the mesh topology and star topology . (6.5)
Question no 2(b) Draw and explain process state transition diagram (6.0)
Question no 3(b) Discuss briefly functions of Network Layer of OSI Model. (6.5)
Question no 2 Differentiate First-in First-out (FIFO) and least Recently used (LRU) page replacement.
Algorithm (Marks:6.5)
Question no 3. Discuss briefly functions of Transport and Session Layer of OSI Model.
(Marks: 6+6.5=12.5)
Question no 3 a) What is network Topology and discuss different types of topologies with figures.
b) What is transmission mode and discuss three different types of transmission mode with examples.
(Marks: 6+6.5=12.5)
Question no 3 Discuss briefly function of physical layer and Data link layer of OSI model, (Marks:12.5)
1. Tread
2. Heavy weight process
3. Light weight process
4. Swapper
5. Dispatcher
Define the condition for deadlock occurrence and also explain the differentiate the dead lock
prevention and detection .
Question no 1 Discuss and list out the malicious programs that are thread for security of the system .
Q 7) What is a process and describe briefly process state transition diagram (Marks:12.5)
Q8) Discuss briefly functions of Network and Transport Layers of OSI Model. (Marks: 12.5
Prepared BY Prof .M.A Khan Punjab Group of college campus # 8
QUESTION NO 2 :- Define critical section and deadlock with four conditions for deadlock occurrence.
(Marks: 12.5)
QUESTION NO 3: Discuss briefly functions of Physical and Network layers of OSI Model Layers. (Marks: 12.5)
Operating system 2018 (supply)
Question no 1:- Differentiate preemptive and non –preemptive scheduling algorithms and also discuss any two types of
each scheduling algorithm . (Marks: 12.5)
Question no 2 Define the following :- (Marks: 12.5)
Virtual memory
Cascading termination
Page fault
Second chance algorithm
Question .7. what is network topology and differentiate different types of topologies with advantages and disadvantages
draw diagram also . (Marks: 12.5)
Page fault, Page size, FIFO Algorithm, NRU Algorithm, LRU Algorithm
Q.6. Differentiate simple paging and simple segmentation. (Marks: 12.5)
Q.7. Discuss Functions of data link and session layers of OSI Model. (Marks: 12.5)
c. Topology
d. Thread
e. Light weight process
Q.8. (Marks: 12.5)
Discuss functions of presentation and Session layers of OSI model .
Operating system 2021 Supply
Q6. (Marks:12.5)
Differentiate Kernel Mode and User Mode of a system execution and also discuss three ways to enter in
kernel mode from user mode.
Q7 (Marks: 12.5)
Define the following: