Professional Documents
Culture Documents
Most Imp-1
Most Imp-1
9. What is segmentation?
12. Port scanning is not an attack but rather a means for a cracker
to detect system vulnerabilities to attack. Discuss the vulnerability if it
occurred in send mail.
17. What is DDOs? Explain the difference between DDOS and DOS attack
18. Attacks which are aimed not at gaining information or stealing
resources but rather at disrupting legitimate use of system or facility are
known as which type of attacks. Explain the working of the attack.
8. Explain Process Control Block. Draw the block diagram of process transition
states.
10. What do you mean by CPU scheduling? Discuss CPU/IO burst cycle.
11. What do you mean by RAID Structure? Also discuss different types of RAID
levels.
15. Five batch jobs A to E arrive at same time. They have estimated running
times 10,2,6,8,4 minutes. Their priorities are 3,2,5,4,1 respectively with 5 being
highest priority. For each of the following algorithm determine mean process
turnaround time. Ignore process swapping overhead. Round Robin (q=3),
Priority Scheduling, FCFS, SJF.
16.Draw Four Gantt charts illustrating the execution of these processes using
FCFS, SJF, priority (a small priority number implies a higher priority), and Round
Robin (quantum=1) scheduling.
17. What do you mean by Deadlock Avoidance? Explain the use of Banker’s
Algorithm for Deadlock Avoidance with illustration.
18. What is Deadlock? List the conditions that lead to deadlock. How Deadlock
can be prevented? 3. What is Deadlock? Explain Deadlock prevention &
Avoidance.
18.Five batch jobs A to E arrive at same time. They have estimated running
times 10,6,2,4 and 8 minutes. Their priorities are 3,5,2,1 and 4 respectively
with 5 being highest priority. For each of the following algorithm determine
mean process turnaround time. Ignore process swapping overhead. Round
Robin, Priority Scheduling, FCFS, SJF.
Explain the following disk scheduling algorithm with examples. i)SSTF ii) SCAN
iii)LOOK
A virtual memory system has the following specification: Size of the virtual
address space=64k Size of the physical address space=4k Page size=512 Virtual
page# physical frame# 0 0 3 1 7 2 4 3 10 4 12 5 30 6 31 7 i)find all the virtual
addresses that will generate a page fault compute the main memory addresses
for the following virtual addresses. 24,3784,10250,30780
Name the different file allocation methods. Explain the linked allocation of file
implementation with merits and demerits.
What is critical section problem and what are the requirements that need to
be satisfied by any solution to critical section problem? Give a solution to a 2
process critical section problem.
3rd Unit :
What are the functions of the Transport Layer? Explain briefly and also name a
few applications based on this layer
Differentiate between LAN, MAN, WAN in terms of range and place where they
are used?
Briefly explain the various kinds of program threats and system threats.
Explain the terms ‘WORMS’ and ‘VIRUSES’ with reference to system threats
Ready
Blocked Running
b.) Will the thread change state if it generates a TLB miss that is resolved in the page
table? If so, to new state?
c.) Will the thread change state if an address reference is resolved in the page table?
If so, to what new state?
8. In some systems, a subdirectory can be read and written by an authorized user, just
an ordinary files can be.
a.) Describe the protection problems that could arise.
b.) Suggest a scheme for dealing with each of these protection problems.
9. The access- control matrix can be used to determine whether a process can switch
from, say, domain A to domain B and enjoy the access privileges of domain B. Is this
approach equivalent to including the access privileges of domain B in those of
domain A?
10. Consider a computer system in which “computer games” can be played by students
only between 10 P.M and 6 A,M., by faculty members between 5 P.M. and 8A.M.,
and by the computer center staff at all times. Suggest a scheme for implementing this
policy efficiently.
11. In what circumstances is the system-call sequence fork () exec() most appropriate?
When is vfork() preferable?
12. Suppose that the following processes arrive for execution at the times indicated. Each
process will run for the amount of time listed. In answering the questions, use non-
pre-emptive scheduling, and base all decisions on the information you have at the
time the decision must be made.
MEMORY MANAGEMENT
7. Given memory partition of 100K, 500K, 200K, 300K, and 600K in order,
how would each of the First-fit, Best-fit and Worst-fit algorithms place the
processes of 212K, 417K, 112K and 426K in order? Which algorithm makes
the most efficient use of memory? Show the diagram of memory status in each
case. (5 / 10 marks)
12. What is the difference between logical and physical address? (2 marks)
14. Given six memory partitions of 300 KB, 600 KB, 350 KB, 200
KB, 750 KB, and 125 KB (in order), how would the first-fit, best-fit,
and worst-fit algorithms place processes of size 115 KB, 500 KB, 358
KB, 200 KB, and 375 KB (in order)? Rank the algorithms in terms of
how efficiently they use memory. (5 marks)
15. Consider a logical address space of 256 pages with a 4-KB page
size, mapped onto a physical memory of 64 frames. (5 marks)
a. How many bits are required in the logical address?
b. How many bits are required in the physical address?
DISK MANAGEMENT
4. Suppose that a disk drive has 5000 cylinders, numbered 0 to 4999. The
drive is currently serving a request at cylinder 143, and the previous
request was at cylinder 125. The queue of pending requests, in FIFO order,
is - 86, 1470, 913, 1774, 948, 1509, 1022, 1750, 130. Starting from the
current head position, what is the total distance (in cylinders) that the disk
arm moves to satisfy all the pending requests, for each of the following
disk scheduling – FCFS, SCAN (elevator). (5 marks)
5. Disk requests come in to the disk for cylinders 10, 22, 20, 2, 40, 6 and 38.
A seek takes 6 msec per cylinder move. How much seek time is for Closest
cylinder next algorithm? Initially arm is at cylinder 20. Starting track at
100.The queue of pending request is, 55,58,39,18,90,160,150,38,184 –
FCFS, SCAN (elevator), SSTF, C SCAN. (5/10 marks)
6. Suppose that a disk drive has 1000 cylinders, numbered 0 to 999. Assume
last request received was at track 345 and the head is moving towards
track 0. The queue of pending requests, in FIFO order, is
123,874,692,475,105,367.
Perform following scheduling algorithm. FIFO, SSTF, SCAN, LOOK,
C-SCAN, C-LOOK. (5 marks)
FILE MANAGEMENT
1) What are file attributes (name, identifier, type, location, size)? (Marks 2)
4) What are the directory structures (single, two, three levels directory,
acyclic and general graph)? (Marks 5)