This document contains 29 questions about operating system concepts including:
1. The three main purposes of an operating system are resource management, abstraction, and control.
2. Operating system structures include kernels, virtual machines, and layers. Kernels provide essential services while virtual machines and layers separate components.
3. The operating system may forsake efficiency to improve security, reliability, or fairness when resources are wasted preventing vulnerabilities or prioritizing certain processes.
This document contains 29 questions about operating system concepts including:
1. The three main purposes of an operating system are resource management, abstraction, and control.
2. Operating system structures include kernels, virtual machines, and layers. Kernels provide essential services while virtual machines and layers separate components.
3. The operating system may forsake efficiency to improve security, reliability, or fairness when resources are wasted preventing vulnerabilities or prioritizing certain processes.
This document contains 29 questions about operating system concepts including:
1. The three main purposes of an operating system are resource management, abstraction, and control.
2. Operating system structures include kernels, virtual machines, and layers. Kernels provide essential services while virtual machines and layers separate components.
3. The operating system may forsake efficiency to improve security, reliability, or fairness when resources are wasted preventing vulnerabilities or prioritizing certain processes.
This document contains 29 questions about operating system concepts including:
1. The three main purposes of an operating system are resource management, abstraction, and control.
2. Operating system structures include kernels, virtual machines, and layers. Kernels provide essential services while virtual machines and layers separate components.
3. The operating system may forsake efficiency to improve security, reliability, or fairness when resources are wasted preventing vulnerabilities or prioritizing certain processes.
1. What are the three main purposes of an operating system?
2. Discuss the Operating System Structures. Describe the various types of O.S Structures. 3. We have stressed the need for an operating system to make efficient use of the computing hardware. When is it appropriate for the operating system to forsake this principle and to “waste” resources? Why is such a system not really wasteful? 4. What is the main difficulty that a programmer must overcome in writing an operating system for a real-time environment? 5. Keeping in mind the various definitions of operating system, consider whether the operating system should include applications such as web browsers and mail programs. Argue both that it should and that it should not, and support your answers. 6. How does the distinction between kernel mode and user mode function as a rudimentary form of protection (security) system? 7. Explain about a. User Mode and Kernel Mode with a suitable example/scenario. b. Multitasking and Multiprogramming with a suitable example/scenario. 8. Which of the following instructions should be privileged? a. Set value of timer. b. Read the clock. c. Clear memory. d. Issue a trap instruction. e. Turn off interrupts. f. Modify entries in device-status table. g. Switch from user to kernel mode. h. Access I/O device. 9. Some early computers protected the operating system by placing it in a memory partition that could not be modified by either the user job or the operating system itself. Describe two difficulties that you think could arise with such a scheme. 10. Some CPUs provide for more than two modes of operation. What are two possible uses of these multiple modes? 11. What do you mean by multicore processor? Briefly Explain about core i3, core i5 and core i7 processors. 12. Differentiate between symmetric and asymmetric multiprocessors. You should draw the diagram also in support of your explanation. 13. Give two reasons why caches are useful. What problems do they solve? What problems do they cause? If a cache can be made as large as the device for which it is caching (for instance, a cache as large as a disk), why not make it that large and eliminate the device? 14. Distinguish between the client–server and peer-to-peer models of distributed systems. 15. What is the purpose of interrupts? How does an interrupt differ from a trap? Can traps be generated intentionally by a user program? If so, for what purpose? 16. Direct memory access is used for high-speed I/O devices in order to avoid increasing the CPU’s execution load. a. How does the CPU interface with the device to coordinate the transfer? b. How does the CPU know when the memory operations are complete? c. The CPU is allowed to execute other programs while the DMA controller is transferring data. Does this process interfere with the execution of the user programs? If so, describe what forms of interference are caused. 17. What is the purpose of system calls? 18. What are the five major activities of an operating system with regard to process management? 19. What are the three major activities of an operating system with regard to memory management? 20. What are the three major activities of an operating system with regard to secondary-storage management? 21. What is the purpose of the command interpreter? Why is it usually separate from the kernel? 22. What system calls have to be executed by a command interpreter or shell in order to start a new process? 23. What do you mean by system calls? What are the different categories of system calls? Explain in detail. 24. What is the purpose of system programs? 25. What is the main advantage of the layered approach to system design? What are the disadvantages of the layered approach? 26. List five services provided by an operating system, and explain how each creates convenience for users. In which cases would it be impossible for user-level programs to provide these services? Explain your answer. 27. Why do some systems store the operating system in firmware, while others store it on disk? 28. How could a system be designed to allow a choice of operating systems from which to boot? What would the bootstrap program need to do? 29. What do you mean by system calls? What are the different categories of system calls? Explain in detail.