Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
Describe the term “Deadlock”. Also explain Deadlock Detection and Deadlock Recovery with the help of different examples.
Describe four services of the operating systems. Make a distinction among the short term, medium term and long term scheduling that are provided by multi-tasking operating systems.
What are the differentiations between a write-allocate and no-write-allocate policy in a cache? With the aid of a fully labelled diagram, make a distinction between direct and associative mapping in c
Describe the meaning of Instruction Set Architecture. With the use of an example, describe how pipelining in microprocessors enhances the throughput of instruction execution.
Provide the four major functions of operating system. Distributed network architecture is whereby services are distributed and implemented among many computers. Give two merits and two demerits of t
Describe the process of mapping data structures and data items to messages. Name five characteristics of real time operating systems.
Note down the complete command line to perform following task in UNIX shell. Write a bash script that displays its name and checks for existence of a file. If the file exists it will display a messag
Draw and describe the basic Linux file system organization. Draw and describe the basic Linux Kernel components. Describe the following with respect to Linux OS.
Why is the phase of Lexical analysis important? Why is input buffering important in Lexical Analysis? Describe all the phases of compilers in detail.
What are the different issues related to disk performance? Describe any one disk scheduling algorithm with appropriate example. What are the advantages and disadvantages of C-SCAN scheduling algorithm
What features of assembly language makes it mandatory to design a two pass assembler? Describe with appropriate example. Draw a neat flowchart for macroprocessor to handle nested macro definitions.
Explain about the evolution of operating systems from mainframe batch systems to mainframe time sharing systems.
Explain the Multics operating system project which was under taken at MIT in the year 1960. Identify any impacts and influences Multics has had on modern day trends in developing secure and trusted
Describe how jacketing could minimize some of the issues of User Level threads. Make a distinction between the controls problems of deadlock and starvation.
Implementing Group Policies in a Windows environment simplify largely the tasks of Systems Administrators. In this context, describe the use of Group Policies and explain four tasks that can be atta
What is the meaning of the term “Fully Qualified Domain Name”? Write down the name of any three technologies which comprise a complete IDA solution.
Using the Active Directory Domains and Trusts console, it is probable to make a variety of different types of trusts between domains and forests. Make a distinction between the “Realm Trust&rd
What are the two primary techniques of implementing security? Briefly describe each one. Give the three elements which determine a user’s access and which define the permissions they have to obj
Make a distinction between “Deadlock Prevention” and “Deadlock Avoidance”. Give detailed description about how recovery from deadlocks can be made possible.
Make a distinction between “Message passing” and “Shared memory”. Use diagrams to demonstrate your answer. Explain what a virtual machine is and give some merits and deme
Supposing, that as a network engineer, you are supposed to execute a firewall, how would you go on to select the right firewall for organisation? Illustrate the differentiations between Host-based IDS
In order for User A to send User B an e-mail message that only User B can read, User A must encrypt the e-mail with which of the following keys?
Make a distinction between Distributed Denial of Service (DDoS) and Denial of Service (DoS). What do you understand by the term Intrusion Detection Systems?
Considering the comparison of Windows and Linux NOS, comment on Virus Vulnerability and Security Issues. Name five types of Internet Protocols function at the Network layer of OSI Model.
Write down any two reasons why Linux Operating System is better than one of its competitors. What is the significance of the “touch” command? Give one of its demerits.