FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUA MCA 2014 Feb 1st Sem 9F00204 Operating Systems Question Paper

Download JNTUA (JNTU Anantapur) MCA (Master of Computer Applications) 2014 Feb Regular-Supplementary 1st Sem 9F00204 Operating Systems Question Paper

This post was last modified on 28 July 2020

JNTUA MCA 1st Sem last 10 year 2010-2020 Previous Question Papers (JNTU Anantapur)


FirstRanker.com

Firstranker's choice

FirstRanker.com

--- Content provided by FirstRanker.com ---

Code: 9F00204

MCA II Semester Supplementary Examinations February 2014

OPERATING SYSTEMS

(For 2009, 2010, 2011 & 2012 admitted batches only)

Time: 3 hours Max. Marks: 60

--- Content provided by‍ FirstRanker.com ---

Answer any FIVE questions

All questions carry equal marks

  1. (a) Give a brief note on the operating system structure.
    (b) Discuss five major categories of system calls in detail.
  2. Consider the following set of processes, with the length of the CPU burst given in milliseconds:

    --- Content provided by⁠ FirstRanker.com ---

    Process | Burst Time Priority
    P1 | 10 3
    P2 | 1 1
    P3 | 2 3
    P4 | 1 4

    --- Content provided by⁠ FirstRanker.com ---

    P5 | 5 2

    The processes are assumed to have arrived in the order P1, P2, P3, P4 and P5 all at time 0.
    Draw four Gantt charts that illustrate the execution of these processes using the following scheduling algorithms: FCFS, SJF, non preemptive priority (a smaller priority number implies a high priority) and RR (quantum = 1).
    What are the turnaround and waiting processes for each process for each of the scheduling algorithms in part a?
  3. --- Content provided by⁠ FirstRanker.com ---

  4. Write the definition of swap () instruction. Explain the implementation of mutual exclusion using swap ().
  5. What is a semaphore? Give the solution to the dining-philosophers problem using semaphores and explain.
  6. What are the benefits of executing a program that is partially in memory?
    List the typical elements found in a page table entry. Define each element.
  7. Explain the purpose of translation look aside buffer.

    --- Content provided by​ FirstRanker.com ---

    Discuss various directory implementation techniques in detail.
  8. Write a short note on free space management.
    Give a detailed note on RAID levels.
  9. What is stable storage? Explain how it is implemented.
    “A deadlocked state is an unsafe state. Not all unsafe states are deadlocks”. Illustrate this with an example.

    --- Content provided by‍ FirstRanker.com ---

    Discuss resource allocation graph algorithm for deadlock avoidance.
  10. Make a comparison of various techniques for implementing an access matrix.
    b) What is the difference between a threat and an attack? Explain about the various security attacks.

FirstRanker.com


--- Content provided by‍ FirstRanker.com ---


This download link is referred from the post: JNTUA MCA 1st Sem last 10 year 2010-2020 Previous Question Papers (JNTU Anantapur)