Code No: 823AA
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
--- Content provided by FirstRanker.com ---
MCA 111 Semester Examinations, June/July - 2018OPERATING SYSTEMS
Time: 3hrs Max.Marks:75
Note:
This question paper contains two parts A and B.
--- Content provided by FirstRanker.com ---
Part A is compulsory which carries 25 marks. Answer all questions in Part A. Part B consists of 5 Units. Answer any one full question from each unit. Each question carries 10 marks and may have a, b, c as sub questions.PART - A
5 x 5 Marks =25
- a) Mention any two operating system calls. [5]
- b) Differentiate preemptive scheduling with non-preemptive scheduling. [5]
- c) Differentiate virtual memory with physical memory. [5]
- d) Mention file access methods. [5]
- e) Discuss goals of protection. [5]
--- Content provided by FirstRanker.com ---
PART -B
5 x 10 Marks =50
--- Content provided by FirstRanker.com ---
- a) Define an operating system. What is its purpose?
b) Explain the various functions of an operating system. [5+5]
OR
- a) Explain the basic features of Real time operating systems.
--- Content provided by FirstRanker.com ---
b) Write the differences between the traps and interrupts. [5+5] - Explain process states with a neat diagram. [10]
OR - a) What is meant by critical section problem? Mention conditions for critical section.
b) Compare semaphores and monitors. [5+5] - a) Explain Paging with Segmentation?
b) What is page fault? Explain page fault service routine with a neat diagram. [5+5]
OR - Explain Page Replacement Algorithms with examples. [10]
- Consider, an ordered disk queue with requests involving in tracks listed in the following order 98, 183, 37, 122, 14, 124, 65 and 67. Read -Write head is initially at track 53 and moving towards track 0. Find the total head movement for the following disk scheduling policies
--- Content provided by FirstRanker.com ---
a) FCFS b) SSTF c) SCAN d) C-SCAN [10]
OR - Explain various file access methods and directory structures. [10]
- a) Enumerate the conditions that characterize a dead-lock?
b) Explain resource allocation (graph) algorithm for dead lock detection with relevant diagrams. [5+5]--- Content provided by FirstRanker.com ---
OR - Explain Access control matrix in detail. [10]
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
This download link is referred from the post: JNTUH MCA 3rd Sem Last 10 Years 2023-2013 Question Papers R20-R09 || Jawaharlal nehru technological university