Professional Documents
Culture Documents
Bcn2053 Operating Systems 11213 PDF
Bcn2053 Operating Systems 11213 PDF
Malaysia
PAHANG
Engineering • Technology • Creativity
DURATION 3 HOURS
INSTRUCTIONS TO CANDIDATE:
1. This question paper consists of Four (4) questions. Answer ALL questions.
2. Write your answers in the answer booklet provided.
3. Answer EACH question on a new page.
4. All calculations and assumptions must be clearly shown. Calculator is allowed
EXAMINATION REQUIREMENTS:
NONE
This examination paper consists of Six (6) printed pages including the front page.
CONFIDENTIAL BCN1BCS/BCG/12131/BCN2053
QUESTION 1
a) An operating systems can be standalone (for example Unix) or could include some
applications such as web browser and mail programs (for example Windows & and Ubuntu).
Explain the following situations where:
i. The Operating System should include such applications, and
ii. The Operating system should be a standalone by itself
[6 Marks]
b) Imagine an operating system that does not perform memory deallocation. Investigate FOUR
(4) unfortunate outcomes that would result and explain your answer.
[4 Marks]
Job List:
i. Using the best-fit algorithm, indicate which memory blocks are allocated to each of
the three arriving jobs.
ii. Using the first-fit algorithm, indicate which memory blocks are allocated to each of
the three arriving jobs.
iii. Based on the findings above, which algorithm is more efficient? Explain your answer.
[8 Marks]
CONFIDENTIAL BCN/BCSIBCG/121311BCN2053
d) In some systems, a subdirectory can be read and written by an authorized user like ordinary
files
[2 Marks]
QUESTION 2
a) Explain the fundamental differences between interactive, batch, real-time, and embedded
systems.
[4 Marks]
b) What are the main differences between operating systems for mainframe computers and
personal computers?
[4 Marks]
c) Compare and contrast internal fragmentation and external fragmentation. Explain the
circumstances where one might be preferred over the other.
[4 Marks]
d) Given that main memory is composed of three page frames for public use and that a program
requests pages in the following order:
a,d,b,a,f,b,e,c,g,f,b,g
i. Using the FIFO page removal algorithm, illustrate a page trace analysis indicating
page faults with asterisks (*). Then compute the failure and success ratios.
ii. Using the LRU page removal algorithm, illustrate a page trace analysis and compute
the failure and success ratios
[8 Marks]
3
CONFIDENTIAL BCNIBCSIBCG/121311BCN2053
QUESTION 3
a) Describe context switching and identify the process information that needs to be saved,
changed, or updated when context switching takes place?
[3 Marks]
A 0 10
B 2 12
C 3 3
D 6 1
E 9 15
With the relevant Gantt chart, calculate the average waiting and turnaround time of the
system in accordance to:
[9 Marks]
rd
CONFIDENTIAL BCNIBCS/BCG/121311BCN2053
c) Consider the directed resource graph shown in above, and answer the following questions.
i. Identify all of the deadlocked processes.
ii. Can the deadlock be resolved without selecting a victim? Explain your answer
iii. Which requests by the three processes for resources from R2 would you satisfy to
minimize the number of processes involved in the deadlock?
iv. Conversely, which requests by the three processes for resources from R2 would
you satisfy to maximize the number of processes involved in deadlock?
[8 Marks]
QUESTION 4
a) Distinguish the differences between CSMAICD and CSMAICA. Provide one example for
each access control technique.
[4 Marks]
5
CONFIDENTIAL BCNIBCSIBCG/121311BCN2053
b) Suppose that a disk drive has 200 cylinders, numbered 0 to 199. The drive is currently
serving a request at cylinder 98, and the previous request was at cylinder 53. The queue of
pending request in FIFO order is:
Starting from the current head position, illustrate and calculate the total distance (in
cylinders) that the disk arm moves to satisfy all the pending requests for each of the
following disk-scheduling algorithms?
(i) SSTF
[9 Marks]
(c) Many users are required to log into several networks and thus have multiple passwords,
which are difficult to remember.
i. Select THREE (3) ways that a user can manage these password requirements and
compare the advantages and disadvantages of each.
ii. Based on the selection above, decide which one you would recommend to
implement when you need to log into several networks with multiple passwords.
[7 Marks]