FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download PTU BCA 2020 March 4th Sem BCA 404 Operating System Question Paper

Download PTU (I.K. Gujral Punjab Technical University Jalandhar (IKGPTU) BCA 2020 March (Bachelor of Computer Application) 4th Sem BCA 404 Operating System Previous Question Paper

This post was last modified on 31 March 2020

PTU BCA Last 10 Years 2011-2021 Previous Question Papers


Roll No. _______________

Total No. of Questions : 14

Total No. of Pages : 04

--- Content provided by‌ FirstRanker.com ---

BCA (Sem.-4)

OPERATING SYSTEM

Subject Code: BCA-404

Paper ID : A0219

Time: 3 Hrs.

--- Content provided by⁠ FirstRanker.com ---

Max. Marks : 75

INSTRUCTIONS TO CANDIDATES :

  1. SECTION-A will be compulsory and have 20 questions of 1 mark each.
  2. SECTION-B will have 8 short answer type questions of 5 marks each, out of which candidate will have to attempt any 5.
  3. SECTION-C will have 5 long answer type questions of 10 marks each, out of which candidate will have to attempt any 3.
  4. --- Content provided by⁠ FirstRanker.com ---


SECTION-A

  1. Multiple Choice Questions :

    A) In a time-sharing operating system, when the time slot given to a process is completed, the process goes from the RUNNING state to

    a) READY state b) BLOCKED state

    c) TERMINATED state d) SUSPENDED state

    --- Content provided by FirstRanker.com ---

    B) Time quantum is defined in

    a) shortest job scheduling algorithm b) round robin scheduling algorithm

    c) priority scheduling algorithm d) multilevel queue scheduling algorithm

    C) A solution to the problem of indefinite blockage of low - priority processes is

    a) Starvation b) Wait queue

    --- Content provided by FirstRanker.com ---

    c) Ready queue d) Aging

    D) A system has 6 identical resources and N processes competing for them. Each process can request atmost 2 resources. Which one of the following values of N could lead to a deadlock?

    a) 1 b) 2

    c) 3 d) 4

    E) A process executes the code

    --- Content provided by⁠ FirstRanker.com ---

    fork();

    fork();

    fork();

    The total number of child processes created is

    a) 3 b) 4

    --- Content provided by​ FirstRanker.com ---

    c) 7 d) 8

    F) What is breach of availability?

    a) This type of violation involves unauthorized reading of data

    b) This violation involves unauthorized modification of data

    c) This violation involves unauthorized destruction of data

    --- Content provided by⁠ FirstRanker.com ---

    d) This violation involves unauthorized use of resources

    G) In paged memory systems, if the page size is increased, then the internal fragmentation generally

    a) becomes less b) becomes more

    c) remains constant d) none of the above

    H) Which of the following is NOT true of deadlock prevention and deadlock avoidance schemes?

    --- Content provided by FirstRanker.com ---

    a) In deadlock prevention, the request for resources is always granted if the resulting state is safe

    b) In deadlock avoidance, the request for resources is always granted if the result state is safe

    c) Deadlock avoidance is less restrictive than deadlock prevention

    d) Deadlock avoidance requires knowledge of resource requirements a priori

    I) There are 10 different processes running on a workstation. Idle processes are waiting for an input event in the input queue. Busy processes are scheduled with the Round-Robin timesharing method. Which out of the following quantum times is the best value for small response times, if the processes have a short runtime, e.g. less than 10ms?

    --- Content provided by‍ FirstRanker.com ---

    a) tQ = 50ms b) tQ = 40ms

    c) tQ = 45ms d) tQ = 15ms

    J) Which of the following is NOT a valid deadlock prevention scheme?

    a) Release all resources before requesting a new resource

    b) Number the resources uniquely and never request a lower numbered resource than the last one requested.

    --- Content provided by FirstRanker.com ---

    c) Never request a resource after releasing any resource

    d) Request and all required resources be allocated before execution.

    Fill in the Blanks :

    K) _______________ scheduler select the process that is ready to execute and allocate the CPU to it.

    L) _______________ is a software-generated interrupt caused either by an error or by a specific request from a user program that an operating-system service be performed.

    --- Content provided by‌ FirstRanker.com ---

    M) Each process is represented in the operating system by a _______________ which contains information associated with a specific process.

    N) In _______________ attack, a legitimate-looking e-mail or web page.misleads a user into entering confidential information.

    O) A _______________ is a process that uses the spawn mechanism to ravage system performance. It spawns copies of itself, using up system resources and locking out all other processes.

    P) The interval from the time of submission of a process to the time of completion is the _______________ time.

    Q) The sequence of directories searched when a file is named is called the _______________

    --- Content provided by⁠ FirstRanker.com ---

    R) A section of disk at the beginning of each volume is set aside to contain the table known as _______________ which has one entry for each disk block and is indexed by block number.

    S) Request and release of resources that are not managed by the operating system can be accomplished through the _______________ and _______________ operations on semaphores.

    T) A program in execution is called _______________


SECTION-B

--- Content provided by​ FirstRanker.com ---

  1. What is trojan horse? Give an example.
  2. Discuss multilevel queue scheduling algorithm.
  3. What are the five major activities of an operating system in regard to file management?
  4. How Multitasking operating system is different from Multiprogramming operating system?
  5. What is the significance of indexed file allocation?
  6. --- Content provided by FirstRanker.com ---

  7. Explain the difference between internal and external fragmentation.
  8. To protect a system, we must take security measures at various levels. Explain.
  9. Explain how deadlocks are detected and corrected.

SECTION-C

  1. How symmetric encryption is different from asymmetric encryption? Explain the RSA encryption algorithm in detail.
  2. --- Content provided by‍ FirstRanker.com ---

  3. Consider the following snapshot of a system :
  4. Allocation Max Available
    ABCD ABCD ABCD
    P0 0 0 1 2 0 0 1 2 1520
    P1 1 0 0 0 1 7 5 0
    P2 1 3 5 4 2 3 5 6
    P3 0 6 3 2 0 6 5 2
    P4 0 0 1 4 0 6 5 6

    Use the banker's algorithm to find whether the system in a safe state? If a request from process P1 arrives for (0,4,2,0), can the request be granted immediately?

  5. Describe the following allocation algorithms with suitable example:
    1. First fit
    2. Best fit
    3. Worst fit
    4. --- Content provided by FirstRanker.com ---

  6. Consider following processes, with the CPU burst time given in milliseconds.
  7. Process Burst Time Priority
    P1 10 3
    P2 1 1
    P3 2 3
    P4 5 4
    P5 5 2

    Process are arrived in P1, P2, P3, P4, P5 order of all at time 0. Draw Gantt chart and calculate turnaround time and waiting time for SJF and FCFS scheduling algorithm.

  8. Consider the following page reference string :
  9. 1,2,3,4, 2, 1,5, 6, 2, 1,2, 3, 7, 6,3,2, 1,2, 3, 6.

    --- Content provided by​ FirstRanker.com ---

    How many page faults would occur for the optimal replacement algorithm, assuming three and four frames? Remember all frames are initially empty, so your first unique pages will all cost one fault each.

    NOTE : Disclosure of Identity by writing Mobile No. or Making of passing request on any page of Answer Sheet will lead to UMC against the Student.

FirstRanker.com


--- Content provided by⁠ FirstRanker.com ---


This download link is referred from the post: PTU BCA Last 10 Years 2011-2021 Previous Question Papers