SlideShare a Scribd company logo
DCS5058 OPERATING SYSTEM 2013/2014
RMY/YHY/CMJ/KHW/NAN Page 1
REVISION QUESTION SEM 3, 2013/2014
1) Describe the differences between Symmetric Multiprocessing and Asymmetric
Multiprocessing. (6M)
2) List and explain TWO (2) problems of serial processing. (4M)
3) Draw and explain in detailed the TWO (2) I/O methods. (7M)
4) Describe the caching process in storage hierarchy. (2M)
5) With the aid of diagram, explain the THREE (3) measures used to organize the storage
system hierarchy. (4M)
6) Process Control Block (PCB) holds the information of all processes and keeps track
of all the processes. Briefly explain SEVEN (7) elements in a PCB. (7M)
7) List and explain THREE (3) benefits of microkernel organization. (6M)
8) Based on the table below, answer the following questions.
Process Burst Time (ms) Priority Arrival Time (ms)
P1 24 3 3
P2 8 2 0
P3 3 1 7
P4 7 4 6
i. Draw TWO (2) Gantt Charts illustrating the execution of processes using the following
scheduling algorithms:
a. First-Come First-Served (2 M)
b. Round Robin (Quantum = 3) (3 M)
ii. Calculate the waiting time of each process and average waiting time for all processes in
each of the scheduling algorithms. (6 M)
DCS5058 OPERATING SYSTEM 2013/2014
RMY/YHY/CMJ/KHW/NAN Page 2
9) Based on the table below, answer the following question.
Process Burst Time
(ms)
Priority Arrival Time
(ms)
P1 10 3 2
P2 13 1 0
P3 7 3 2
P4 17 4 4
P5 5 2 6
Draw the Gantt chart for each of the following scheduling algorithms. Calculate the waiting time
for each of the process as well as the average waiting time.
i. First-Come First-Served (5M)
ii. Non-preemptive Shortest-Job-First (5M)
iii. Preemptive Shortest-Job-First (5M)
iv. Non-preemptive Priority (5M)
v. Preemptive Priority (5M)
ivv. Round-Robin (Quantum = 3) (5M)
DCS5058 OPERATING SYSTEM 2013/2014
RMY/YHY/CMJ/KHW/NAN Page 3
10) Consider a system with four processes P1, P2, P3 and P4 and resource types scanner, printer
and magnetic disk having the following requirements and current allocations for these resources:
Scanner Printer Magnetic Disk
Max Allocation Max Allocation Max Allocation
P1 8 1 2 1 0 0
P2 6 1 1 0 1 0
P3 7 3 7 4 3 3
P4 4 2 5 3 6 3
Available
Scanner Printer Disk
3 3 3
i. Given the available resources as shown above, calculate the total instances of resource
type scanner, printer and magnetic disk. (1.5 M)
ii. Determine the content of the matrix Need. (3 M)
iii. Determine if the above system is in a safe state. (4.5 M)
11) Given a heap of memory management scheme with the following free list where U: Used
and H: Hole:
U H U U H H U H U H U H H H
The following process requests will be received in order:
Process number Size in Kilobytes
1 55
2 20
3 15
4 47
5 30
Show how the memory requests above are allocated using each of the allocation schemes:
i. Worst Fit (WF) [5 M]
ii. Best Fit (BF) [5 M]
0K 30K 48K 60K 100K 120K 160K 200K 256K 310K 330K 400K 425K 460K 580K
DCS5058 OPERATING SYSTEM 2013/2014
RMY/YHY/CMJ/KHW/NAN Page 4
12) Given a heap of memory management scheme with the following free list:
U U H H U H U U H H U H U H H H
The following process requests will be received in order:
Process Number Size in Kilobytes
1 25
2 56
3 89
4 63
5 41
Show how the memory requests above are allocated using the following memory allocation
schemes.
i. Best Fit (BF) (3 M)
ii. First Fit (FF) (3 M)
13) Consider the following page reference string:
3,4,2,1,4,7,2,5,3,6,1,3,5,7
Assuming a paging scheme with FOUR (4) frames is initially empty. Trace the allocation
of pages to frames and find out page fault occur using the following page replacement
algorithms:
i. First in First Out (FIFO) [7.5 M]
ii. Optimal [7.5 M]
0 K 34K 60K 80K 119K 130K 166K 190K 215K 244K 286K 298K 340K 455K 638K 688K 808K
* U - Used
* H - Hole
DCS5058 OPERATING SYSTEM 2013/2014
RMY/YHY/CMJ/KHW/NAN Page 5
14) Consider the following page reference string:
a b, c, d, a, e, c, f, a, b, a, c, e, b, d
Assume that a paging scheme with FOUR (4) frames is initially empty. Trace the allocation
of pages to frames and determine page faults occur using the following page replacement
algorithms:
i. Least Recently Used (LRU) algorithm (5 M)
ii. First In First Out (FIFO) algorithm (5 M)
15) Explain how create operations works in file system. [2m]
16) List FOUR (4) disadvantages of single-level directory structure. [4m]

More Related Content

What's hot

An Efficient Pipelined VLSI Architecture for Lifting-Based 2D-Discrete Wavele...
An Efficient Pipelined VLSI Architecture for Lifting-Based 2D-Discrete Wavele...An Efficient Pipelined VLSI Architecture for Lifting-Based 2D-Discrete Wavele...
An Efficient Pipelined VLSI Architecture for Lifting-Based 2D-Discrete Wavele...
Rahul Jain
 
IOEfficientParalleMatrixMultiplication_present
IOEfficientParalleMatrixMultiplication_presentIOEfficientParalleMatrixMultiplication_present
IOEfficientParalleMatrixMultiplication_present
Shubham Joshi
 

What's hot (20)

A Novel Approach of Caching Direct Mapping using Cubic Approach
A Novel Approach of Caching Direct Mapping using Cubic ApproachA Novel Approach of Caching Direct Mapping using Cubic Approach
A Novel Approach of Caching Direct Mapping using Cubic Approach
 
Area Efficient and Reduced Pin Count Multipliers
Area Efficient and Reduced Pin Count MultipliersArea Efficient and Reduced Pin Count Multipliers
Area Efficient and Reduced Pin Count Multipliers
 
Faster Practical Block Compression for Rank/Select Dictionaries
Faster Practical Block Compression for Rank/Select DictionariesFaster Practical Block Compression for Rank/Select Dictionaries
Faster Practical Block Compression for Rank/Select Dictionaries
 
SPAA11
SPAA11SPAA11
SPAA11
 
An Efficient Pipelined VLSI Architecture for Lifting-Based 2D-Discrete Wavele...
An Efficient Pipelined VLSI Architecture for Lifting-Based 2D-Discrete Wavele...An Efficient Pipelined VLSI Architecture for Lifting-Based 2D-Discrete Wavele...
An Efficient Pipelined VLSI Architecture for Lifting-Based 2D-Discrete Wavele...
 
Basic use of xcms
Basic use of xcmsBasic use of xcms
Basic use of xcms
 
Fast Identification of Heavy Hitters by Cached and Packed Group Testing
Fast Identification of Heavy Hitters by Cached and Packed Group TestingFast Identification of Heavy Hitters by Cached and Packed Group Testing
Fast Identification of Heavy Hitters by Cached and Packed Group Testing
 
Drawing Fonts
Drawing FontsDrawing Fonts
Drawing Fonts
 
Chenchu
ChenchuChenchu
Chenchu
 
Real-time or full-precision CRS imaging using a cloud computing portal: multi...
Real-time or full-precision CRS imaging using a cloud computing portal: multi...Real-time or full-precision CRS imaging using a cloud computing portal: multi...
Real-time or full-precision CRS imaging using a cloud computing portal: multi...
 
Pt 3 xii cs final
Pt 3 xii cs finalPt 3 xii cs final
Pt 3 xii cs final
 
Memory allocation (4)
Memory allocation (4)Memory allocation (4)
Memory allocation (4)
 
IOEfficientParalleMatrixMultiplication_present
IOEfficientParalleMatrixMultiplication_presentIOEfficientParalleMatrixMultiplication_present
IOEfficientParalleMatrixMultiplication_present
 
3rd 3DDRESD: Floorplacer
3rd 3DDRESD: Floorplacer3rd 3DDRESD: Floorplacer
3rd 3DDRESD: Floorplacer
 
DAT31W_CH8.2_NOTES
DAT31W_CH8.2_NOTESDAT31W_CH8.2_NOTES
DAT31W_CH8.2_NOTES
 
B010430814
B010430814B010430814
B010430814
 
Bf36342346
Bf36342346Bf36342346
Bf36342346
 
Fast Wavelet Tree Construction in Practice
Fast Wavelet Tree Construction in PracticeFast Wavelet Tree Construction in Practice
Fast Wavelet Tree Construction in Practice
 
Hw 4
Hw 4Hw 4
Hw 4
 
Craig-Bampton Method
Craig-Bampton MethodCraig-Bampton Method
Craig-Bampton Method
 

Viewers also liked (6)

08
0808
08
 
Aulas virtuales
Aulas virtualesAulas virtuales
Aulas virtuales
 
Behaviorism theory
Behaviorism theoryBehaviorism theory
Behaviorism theory
 
Community profile-eritrea
Community profile-eritreaCommunity profile-eritrea
Community profile-eritrea
 
Silicon Valley BLN Launch Presentation
Silicon Valley BLN Launch PresentationSilicon Valley BLN Launch Presentation
Silicon Valley BLN Launch Presentation
 
Supreme Flour World Wheat 2012
Supreme Flour World Wheat 2012Supreme Flour World Wheat 2012
Supreme Flour World Wheat 2012
 

Similar to Os revision ques

2009 Punjab Technical University B.C.A OPERATING SYSTEM Question paper
2009 Punjab Technical University B.C.A OPERATING SYSTEM Question paper2009 Punjab Technical University B.C.A OPERATING SYSTEM Question paper
2009 Punjab Technical University B.C.A OPERATING SYSTEM Question paper
Monica Sabharwal
 
Performance of metaheuristic methods for loop
Performance of metaheuristic methods for loopPerformance of metaheuristic methods for loop
Performance of metaheuristic methods for loop
IAEME Publication
 
IFSM 310 Software and Hardware Infrastructure ConceptsComputer.docx
IFSM 310 Software and Hardware Infrastructure ConceptsComputer.docxIFSM 310 Software and Hardware Infrastructure ConceptsComputer.docx
IFSM 310 Software and Hardware Infrastructure ConceptsComputer.docx
scuttsginette
 
Operating%20 system iii_201
Operating%20 system iii_201Operating%20 system iii_201
Operating%20 system iii_201
tafaratapera
 

Similar to Os revision ques (20)

VTU 5TH SEM CSE OPERATING SYSTEMS SOLVED PAPERS
VTU 5TH SEM CSE OPERATING SYSTEMS SOLVED PAPERSVTU 5TH SEM CSE OPERATING SYSTEMS SOLVED PAPERS
VTU 5TH SEM CSE OPERATING SYSTEMS SOLVED PAPERS
 
cloud compute
cloud computecloud compute
cloud compute
 
2009 Punjab Technical University B.C.A OPERATING SYSTEM Question paper
2009 Punjab Technical University B.C.A OPERATING SYSTEM Question paper2009 Punjab Technical University B.C.A OPERATING SYSTEM Question paper
2009 Punjab Technical University B.C.A OPERATING SYSTEM Question paper
 
MaPU-HPCA2016
MaPU-HPCA2016MaPU-HPCA2016
MaPU-HPCA2016
 
Operating system and unix code 303205 bca 2nd semester exam. ...
Operating system  and unix    code  303205   bca     2nd semester     exam.  ...Operating system  and unix    code  303205   bca     2nd semester     exam.  ...
Operating system and unix code 303205 bca 2nd semester exam. ...
 
Performance of metaheuristic methods for loop
Performance of metaheuristic methods for loopPerformance of metaheuristic methods for loop
Performance of metaheuristic methods for loop
 
IFSM 310 Software and Hardware Infrastructure ConceptsComputer.docx
IFSM 310 Software and Hardware Infrastructure ConceptsComputer.docxIFSM 310 Software and Hardware Infrastructure ConceptsComputer.docx
IFSM 310 Software and Hardware Infrastructure ConceptsComputer.docx
 
Multiprocessor Systems
Multiprocessor SystemsMultiprocessor Systems
Multiprocessor Systems
 
171905 2171903-cam
171905 2171903-cam171905 2171903-cam
171905 2171903-cam
 
Mcs 041 assignment solution (2020-21)
Mcs 041 assignment solution (2020-21)Mcs 041 assignment solution (2020-21)
Mcs 041 assignment solution (2020-21)
 
Design and Implementation of Repair-aware Test Flow for Multi-Memory
Design and Implementation of Repair-aware Test Flow for Multi-MemoryDesign and Implementation of Repair-aware Test Flow for Multi-Memory
Design and Implementation of Repair-aware Test Flow for Multi-Memory
 
Operating%20 system iii_201
Operating%20 system iii_201Operating%20 system iii_201
Operating%20 system iii_201
 
CS6401 Operating systems - Solved Examples
CS6401 Operating systems - Solved ExamplesCS6401 Operating systems - Solved Examples
CS6401 Operating systems - Solved Examples
 
6_2 Flexible MFG Performance.ppt
6_2 Flexible MFG Performance.ppt6_2 Flexible MFG Performance.ppt
6_2 Flexible MFG Performance.ppt
 
Operating systems question bank
Operating systems question bankOperating systems question bank
Operating systems question bank
 
J045075661
J045075661J045075661
J045075661
 
Operating System Multiple Choice Questions
Operating System Multiple Choice QuestionsOperating System Multiple Choice Questions
Operating System Multiple Choice Questions
 
ca-ap9222-pdf
ca-ap9222-pdfca-ap9222-pdf
ca-ap9222-pdf
 
flexible-manufacturing-systems
 flexible-manufacturing-systems flexible-manufacturing-systems
flexible-manufacturing-systems
 
An Index-first Addressing Scheme for Multi-level Caches
An Index-first Addressing Scheme for Multi-level CachesAn Index-first Addressing Scheme for Multi-level Caches
An Index-first Addressing Scheme for Multi-level Caches
 

Recently uploaded

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 

Recently uploaded (20)

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
КАТЕРИНА АБЗЯТОВА «Ефективне планування тестування ключові аспекти та практ...
КАТЕРИНА АБЗЯТОВА  «Ефективне планування тестування  ключові аспекти та практ...КАТЕРИНА АБЗЯТОВА  «Ефективне планування тестування  ключові аспекти та практ...
КАТЕРИНА АБЗЯТОВА «Ефективне планування тестування ключові аспекти та практ...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 

Os revision ques

  • 1. DCS5058 OPERATING SYSTEM 2013/2014 RMY/YHY/CMJ/KHW/NAN Page 1 REVISION QUESTION SEM 3, 2013/2014 1) Describe the differences between Symmetric Multiprocessing and Asymmetric Multiprocessing. (6M) 2) List and explain TWO (2) problems of serial processing. (4M) 3) Draw and explain in detailed the TWO (2) I/O methods. (7M) 4) Describe the caching process in storage hierarchy. (2M) 5) With the aid of diagram, explain the THREE (3) measures used to organize the storage system hierarchy. (4M) 6) Process Control Block (PCB) holds the information of all processes and keeps track of all the processes. Briefly explain SEVEN (7) elements in a PCB. (7M) 7) List and explain THREE (3) benefits of microkernel organization. (6M) 8) Based on the table below, answer the following questions. Process Burst Time (ms) Priority Arrival Time (ms) P1 24 3 3 P2 8 2 0 P3 3 1 7 P4 7 4 6 i. Draw TWO (2) Gantt Charts illustrating the execution of processes using the following scheduling algorithms: a. First-Come First-Served (2 M) b. Round Robin (Quantum = 3) (3 M) ii. Calculate the waiting time of each process and average waiting time for all processes in each of the scheduling algorithms. (6 M)
  • 2. DCS5058 OPERATING SYSTEM 2013/2014 RMY/YHY/CMJ/KHW/NAN Page 2 9) Based on the table below, answer the following question. Process Burst Time (ms) Priority Arrival Time (ms) P1 10 3 2 P2 13 1 0 P3 7 3 2 P4 17 4 4 P5 5 2 6 Draw the Gantt chart for each of the following scheduling algorithms. Calculate the waiting time for each of the process as well as the average waiting time. i. First-Come First-Served (5M) ii. Non-preemptive Shortest-Job-First (5M) iii. Preemptive Shortest-Job-First (5M) iv. Non-preemptive Priority (5M) v. Preemptive Priority (5M) ivv. Round-Robin (Quantum = 3) (5M)
  • 3. DCS5058 OPERATING SYSTEM 2013/2014 RMY/YHY/CMJ/KHW/NAN Page 3 10) Consider a system with four processes P1, P2, P3 and P4 and resource types scanner, printer and magnetic disk having the following requirements and current allocations for these resources: Scanner Printer Magnetic Disk Max Allocation Max Allocation Max Allocation P1 8 1 2 1 0 0 P2 6 1 1 0 1 0 P3 7 3 7 4 3 3 P4 4 2 5 3 6 3 Available Scanner Printer Disk 3 3 3 i. Given the available resources as shown above, calculate the total instances of resource type scanner, printer and magnetic disk. (1.5 M) ii. Determine the content of the matrix Need. (3 M) iii. Determine if the above system is in a safe state. (4.5 M) 11) Given a heap of memory management scheme with the following free list where U: Used and H: Hole: U H U U H H U H U H U H H H The following process requests will be received in order: Process number Size in Kilobytes 1 55 2 20 3 15 4 47 5 30 Show how the memory requests above are allocated using each of the allocation schemes: i. Worst Fit (WF) [5 M] ii. Best Fit (BF) [5 M] 0K 30K 48K 60K 100K 120K 160K 200K 256K 310K 330K 400K 425K 460K 580K
  • 4. DCS5058 OPERATING SYSTEM 2013/2014 RMY/YHY/CMJ/KHW/NAN Page 4 12) Given a heap of memory management scheme with the following free list: U U H H U H U U H H U H U H H H The following process requests will be received in order: Process Number Size in Kilobytes 1 25 2 56 3 89 4 63 5 41 Show how the memory requests above are allocated using the following memory allocation schemes. i. Best Fit (BF) (3 M) ii. First Fit (FF) (3 M) 13) Consider the following page reference string: 3,4,2,1,4,7,2,5,3,6,1,3,5,7 Assuming a paging scheme with FOUR (4) frames is initially empty. Trace the allocation of pages to frames and find out page fault occur using the following page replacement algorithms: i. First in First Out (FIFO) [7.5 M] ii. Optimal [7.5 M] 0 K 34K 60K 80K 119K 130K 166K 190K 215K 244K 286K 298K 340K 455K 638K 688K 808K * U - Used * H - Hole
  • 5. DCS5058 OPERATING SYSTEM 2013/2014 RMY/YHY/CMJ/KHW/NAN Page 5 14) Consider the following page reference string: a b, c, d, a, e, c, f, a, b, a, c, e, b, d Assume that a paging scheme with FOUR (4) frames is initially empty. Trace the allocation of pages to frames and determine page faults occur using the following page replacement algorithms: i. Least Recently Used (LRU) algorithm (5 M) ii. First In First Out (FIFO) algorithm (5 M) 15) Explain how create operations works in file system. [2m] 16) List FOUR (4) disadvantages of single-level directory structure. [4m]