• Q : Explaining deadlock detection and deadlock recovery....
    Operating System :

    Describe the term “Deadlock”. Also explain Deadlock Detection and Deadlock Recovery with the help of different examples.

  • Q : Four services of operating systems....
    Operating System :

    Describe four services of the operating systems. Make a distinction among the short term, medium term and long term scheduling that are provided by multi-tasking operating systems.

  • Q : Direct and associative mapping in cache memory....
    Operating System :

    What are the differentiations between a write-allocate and no-write-allocate policy in a cache? With the aid of a fully labelled diagram, make a distinction between direct and associative mapping in c

  • Q : Meaning of instruction set architecture....
    Operating System :

    Describe the meaning of Instruction Set Architecture. With the use of an example, describe how pipelining in microprocessors enhances the throughput of instruction execution.

  • Q : Major functions of operating system....
    Operating System :

    Provide the four major functions of operating system. Distributed network architecture is whereby services are distributed and implemented among many computers. Give two merits and two demerits of t

  • Q : Process of mapping data structures....
    Operating System :

    Describe the process of mapping data structures and data items to messages. Name five characteristics of real time operating systems.

  • Q : Complete command line to perform task in unix shell....
    Operating System :

    Note down the complete command line to perform following task in UNIX shell. Write a bash script that displays its name and checks for existence of a file. If the file exists it will display a messag

  • Q : Describing basic linux file system organization....
    Operating System :

    Draw and describe the basic Linux file system organization. Draw and describe the basic Linux Kernel components. Describe the following with respect to Linux OS.

  • Q : Input buffering is important in phase of lexical analysis....
    Operating System :

    Why is the phase of Lexical analysis important? Why is input buffering important in Lexical Analysis? Describe all the phases of compilers in detail.

  • Q : Advantages and disadvantages of c-scan scheduling algorithm....
    Operating System :

    What are the different issues related to disk performance? Describe any one disk scheduling algorithm with appropriate example. What are the advantages and disadvantages of C-SCAN scheduling algorithm

  • Q : Flowchart-macroprocessor to handle nested macro definitions....
    Operating System :

    What features of assembly language makes it mandatory to design a two pass assembler? Describe with appropriate example. Draw a neat flowchart for macroprocessor to handle nested macro definitions.

  • Q : Evolution of operating systems from mainframe batch system....
    Operating System :

    Explain about the evolution of operating systems from mainframe batch systems to mainframe time sharing systems.

  • Q : Explaining multics operating system project....
    Operating System :

    Explain the Multics operating system project which was under taken at MIT in the year 1960. Identify any impacts and influences Multics has had on modern day trends in developing secure and trusted

  • Q : Controls problems of deadlock and starvation....
    Operating System :

    Describe how jacketing could minimize some of the issues of User Level threads. Make a distinction between the controls problems of deadlock and starvation.

  • Q : Tasks of systems administrators....
    Operating System :

    Implementing Group Policies in a Windows environment simplify largely the tasks of Systems Administrators. In this context, describe the use of Group Policies and explain four tasks that can be atta

  • Q : Fully qualified domain name....
    Operating System :

    What is the meaning of the term “Fully Qualified Domain Name”? Write down the name of any three technologies which comprise a complete IDA solution.

  • Q : Active directory domains and trusts console....
    Operating System :

    Using the Active Directory Domains and Trusts console, it is probable to make a variety of different types of trusts between domains and forests. Make a distinction between the “Realm Trust&rd

  • Q : Primary techniques of implementing security....
    Operating System :

    What are the two primary techniques of implementing security? Briefly describe each one. Give the three elements which determine a user’s access and which define the permissions they have to obj

  • Q : Deadlock prevention and deadlock avoidance....
    Operating System :

    Make a distinction between “Deadlock Prevention” and “Deadlock Avoidance”. Give detailed description about how recovery from deadlocks can be made possible.

  • Q : Message passing and shared memory....
    Operating System :

    Make a distinction between “Message passing” and “Shared memory”.  Use diagrams to demonstrate your answer. Explain what a virtual machine is and give some merits and deme

  • Q : Host-based ids and network hosed ids....
    Operating System :

    Supposing, that as a network engineer, you are supposed to execute a firewall, how would you go on to select the right firewall for organisation? Illustrate the differentiations between Host-based IDS

  • Q : Transmission control protocol....
    Operating System :

    In order for User A to send User B an e-mail message that only User B can read, User A must encrypt the e-mail with which of the following keys?

  • Q : Intrusion detection systems-distributed denial of service....
    Operating System :

    Make a distinction between Distributed Denial of Service (DDoS) and Denial of Service (DoS). What do you understand by the term Intrusion Detection Systems?

  • Q : Comparison of windows and linux nos....
    Operating System :

    Considering the comparison of Windows and Linux NOS, comment on Virus Vulnerability and Security Issues. Name five types of Internet Protocols function at the Network layer of OSI Model.

  • Q : Significance of touch command....
    Operating System :

    Write down any two reasons why Linux Operating System is better than one of its competitors. What is the significance of the “touch” command? Give one of its demerits.

©TutorsGlobe All rights reserved 2022-2023.