Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
Illustrate out the purpose of the “Access Token” in Security Principals and Security Identifiers. Share permissions have important limitations. Name and illustrate out any four of these li
There are different kinds of viruses which affect a program. List all the two (2) common viruses and illustrate out how they affect programs. List all the two (2) antivirus techniques employed for pr
Illustrate out internal and external fragmentation. Illustrate out 4 algorithms for allocating regions of contiguous memory, and comment on their properties.
Illustrate out the term a ‘file’ and list all three (3) objectives of file management system. List all 2 ways in which programs access files and determine for what file kinds you would use
What is the concept of the atomic operation? Illustrate out the concept involved in the producer – consumer problem.
What is the common disadvantage of all the real memory management methods? How is it overcome in the virtual memory management schemes?
How the access rights are implementation in the sharing of segmentation?
Illustrate the variable partitioned memory management? Describe by using appropriate example.
How are the tracks of status of memory is kept in the partitioned memory management?
Distinguish between the terms deadlock avoidance and deadlock prevention.
What are the various states of a process? Describe by using a process state transition diagram.
What do you mean by the term extended machine view? What are the benefits of hierarchical operating system structure? Describe.
What are the main objectives of the operating system? Illustrate.
What do you mean by deadlock avoidance? Describe the Banker’s algorithm for deadlock avoidance with appropriate example.
Explain the two kinds of queries employed in resolving FQDN. Illustrate briefly three benefits of using “Domains” in the Active Directory.
Illustrate the different techniques employed to handle deadlocks. Describe the three kinds of dynamic storage allocation.
Name all three types of hardware protection and explain each briefly. Describe three additional Operating System functions which ensure efficient system operations instead of assisting the user.
What is CPU scheduling? Explain the characteristics of CPU scheduling algorithms. What do you mean by deadlock avoidance? Describe the Banker’s algorithm for deadlock avoidance with suitable exa
What is external fragmentation? Discuss different ways of handling the problem of external fragmentation.
What is a Process Control Block? Explain each field in the PCB. What is meant by race condition of concurrent access ? Explain with an example.
Write down the differences between user-level and kernel-level threads? Under what situation is one type better than the other? Explain the cause of thrashing? How does the system detect thrashing?
Name five problems with solutions that might take place while installing the Linux from Scratch (LFS) system.
For the given, cmd1 and cmd2 are arbitrary UNIX commands, and file1 and file2 are files owned by you. Write UNIX (bash) commands to:
What is the role of device independent layer of device driver? In brief explain why a micro-kernel operating system structure is more robust than a monolithic (simple) operating system structure.
Name all four contemporary technologies that are related to Grid computing. What are the major distinctions between conventional distributed computing and Grid computing?