SlideShare a Scribd company logo
1 of 4
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
(Prefer mailing. Call in emergency )
ASSIGNMENT
PROGRAM BSc IT
SEMESTER SECOND
SUBJECT CODE & NAME BT0070, Operating Systems
CREDIT 4
BK ID B0954
MAX.MARKS 60
Q. No.1 List the approaches to design operating system structures. Explain any two of them. 2+8=10
Answer:
Listing of approaches to design operating system structures:
 Layered approach
 The kernel based approach
 The virtual machine approach
 Layered approach
 Dijkstra suggested the layered approach to lessen the design and implementation complexities
of an operating system. The layered
2 Write short notes on:
1. Process Creation
2. Terminating Process 5+5= 10
Answer:
1. Process Creation
During the course of execution, a process may create several new proceses using a create-process
system call. The creating process is called a parent process and the new processes are called the children
of that process. Each of these new processes may in turn create other processes, forming a tree of
processes.
Process Termination
A process terminates when it finishes executing its last statement and asks the operating system to
delete it by using the exit system call. At that time, the process should return the data (output) ti its
parent process via the wait system call. All the resources of the process, including physical and virtual
memory, open files, and I/O buffers, are deallocated by the operating system.
Only a parent process can cause
3 Is it possible to check the condition of mutual exclusion through hardware assistance? If yes, how?
10
Answer: Checking for mutual exclusion is also possible through hardware. Special instructions called
Test and Set Lock (TSL) is used for the purpose. An important feature is that the set of instructions used
for this purpose is indivisible, that is, they cannot be interrupted during execution. The instruction has
the format TSL ACC, IND where ACC is an accumulator register and IND is a memory location used as a
flag. Whenever the instruction is
Q4
1. Given a total of 5 units of resource type 1 and 4 units of resource type 2, tell whether the following
system is in a safe or unsafe state. Show your work.
Type 1 Type 2
Process Used Max Used Max
P1 1 2 1 3
P2 1 3 1 2
P3 2 4 1 4
5. What is the concept of virtual memory? Why virtual memory is needed? 3+7= 10
Answer: Virtual memory is a technique that allows execution of processes that may not be entirely in
memory. In addition, virtual memory allows mapping of a large virtual address space onto a smaller
physical memory. It also raises the degree of multi-programming and increases CPU utilization. Because
of the above features, users are freed from worrying about memory requirements and availability.
Need for Virtual Memory Technique
Every process needs to be loaded into
6 What do you mean by Global OS? State the concept of migration and resource allocation
in Global OS.
4+6= 10
Answer: Global Operating System (GOS)
The NOS is responsible for activities such as memory and process management on the server. The NOS
converts a request into a task, schedules and executes it. Memory and processing power in all other
computers in the network is not tapped to the maximum by a NOS. This is exactly what the GOS
attempts to do. It has a list of processes executing on different machines and the resources needed by
each one of them. Relatively free
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
(Prefer mailing. Call in emergency )

More Related Content

Viewers also liked

10 reasons to_practice_yoga
10 reasons to_practice_yoga10 reasons to_practice_yoga
10 reasons to_practice_yoga
berenice
 
Chapter 1 edited version
Chapter 1 edited versionChapter 1 edited version
Chapter 1 edited version
mikof
 
5 a operasi jasa
5 a operasi jasa5 a operasi jasa
5 a operasi jasa
Ade Yh
 
4.26.2010 lecture 2
4.26.2010 lecture 24.26.2010 lecture 2
4.26.2010 lecture 2
Greg
 
Spreadsheet By Group
Spreadsheet By GroupSpreadsheet By Group
Spreadsheet By Group
pendixballpen
 
6. software libre y software propietario
6. software libre y software propietario6. software libre y software propietario
6. software libre y software propietario
Daniel Merchan
 
Ideas of Culture and Popular Culture
Ideas of Culture and Popular CultureIdeas of Culture and Popular Culture
Ideas of Culture and Popular Culture
Vadher Ankita
 
Política e gestão cultural fgv
Política e gestão cultural fgvPolítica e gestão cultural fgv
Política e gestão cultural fgv
Karlla Costa
 

Viewers also liked (20)

Una red
Una redUna red
Una red
 
Ch05
Ch05Ch05
Ch05
 
10 reasons to_practice_yoga
10 reasons to_practice_yoga10 reasons to_practice_yoga
10 reasons to_practice_yoga
 
Final
FinalFinal
Final
 
Butlletí n.21. Acció de Govern
Butlletí n.21. Acció de GovernButlletí n.21. Acció de Govern
Butlletí n.21. Acció de Govern
 
Twinztastic
TwinztasticTwinztastic
Twinztastic
 
Chapter 1 edited version
Chapter 1 edited versionChapter 1 edited version
Chapter 1 edited version
 
5 a operasi jasa
5 a operasi jasa5 a operasi jasa
5 a operasi jasa
 
4.26.2010 lecture 2
4.26.2010 lecture 24.26.2010 lecture 2
4.26.2010 lecture 2
 
2014 04 14 happyweek 63
2014 04 14  happyweek 632014 04 14  happyweek 63
2014 04 14 happyweek 63
 
Spreadsheet By Group
Spreadsheet By GroupSpreadsheet By Group
Spreadsheet By Group
 
6. software libre y software propietario
6. software libre y software propietario6. software libre y software propietario
6. software libre y software propietario
 
Ideas of Culture and Popular Culture
Ideas of Culture and Popular CultureIdeas of Culture and Popular Culture
Ideas of Culture and Popular Culture
 
Gallego y Martos
Gallego y MartosGallego y Martos
Gallego y Martos
 
Alquimina
AlquiminaAlquimina
Alquimina
 
How to use apostrophes
How to use apostrophes How to use apostrophes
How to use apostrophes
 
Christianstephen (Banda Cs)
Christianstephen (Banda Cs)Christianstephen (Banda Cs)
Christianstephen (Banda Cs)
 
Política e gestão cultural fgv
Política e gestão cultural fgvPolítica e gestão cultural fgv
Política e gestão cultural fgv
 
Foreign direct investment
Foreign direct investmentForeign direct investment
Foreign direct investment
 
Pre-Cal 40S Slides June 2, 2008
Pre-Cal 40S Slides June 2, 2008Pre-Cal 40S Slides June 2, 2008
Pre-Cal 40S Slides June 2, 2008
 

Similar to Bt0070 operating systems

operating system question bank
operating system question bankoperating system question bank
operating system question bank
rajatdeep kaur
 
Os files 2
Os files 2Os files 2
Os files 2
Amit Pal
 
operating system for computer engineering ch3.ppt
operating system for computer engineering ch3.pptoperating system for computer engineering ch3.ppt
operating system for computer engineering ch3.ppt
gezaegebre1
 

Similar to Bt0070 operating systems (20)

operating system question bank
operating system question bankoperating system question bank
operating system question bank
 
LM9 - OPERATIONS, SCHEDULING, Inter process xommuncation
LM9 - OPERATIONS, SCHEDULING, Inter process xommuncationLM9 - OPERATIONS, SCHEDULING, Inter process xommuncation
LM9 - OPERATIONS, SCHEDULING, Inter process xommuncation
 
VTU 5TH SEM CSE OPERATING SYSTEMS SOLVED PAPERS
VTU 5TH SEM CSE OPERATING SYSTEMS SOLVED PAPERSVTU 5TH SEM CSE OPERATING SYSTEMS SOLVED PAPERS
VTU 5TH SEM CSE OPERATING SYSTEMS SOLVED PAPERS
 
Forecasting database performance
Forecasting database performanceForecasting database performance
Forecasting database performance
 
Bsc it winter 2013 2nd sem
Bsc it  winter 2013 2nd semBsc it  winter 2013 2nd sem
Bsc it winter 2013 2nd sem
 
Bt0070, operating systems
Bt0070, operating systemsBt0070, operating systems
Bt0070, operating systems
 
Os files 2
Os files 2Os files 2
Os files 2
 
unit-2.pdf
unit-2.pdfunit-2.pdf
unit-2.pdf
 
Cs8493 unit 2
Cs8493 unit 2Cs8493 unit 2
Cs8493 unit 2
 
operating system for computer engineering ch3.ppt
operating system for computer engineering ch3.pptoperating system for computer engineering ch3.ppt
operating system for computer engineering ch3.ppt
 
Complete Operating System notes
Complete Operating System notesComplete Operating System notes
Complete Operating System notes
 
Completeosnotes
CompleteosnotesCompleteosnotes
Completeosnotes
 
Bca2010 – operating system
Bca2010 – operating systemBca2010 – operating system
Bca2010 – operating system
 
SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...
SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...
SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...
 
BITS 1213 - OPERATING SYSTEM (PROCESS,THREAD,SYMMETRIC MULTIPROCESSOR,MICROKE...
BITS 1213 - OPERATING SYSTEM (PROCESS,THREAD,SYMMETRIC MULTIPROCESSOR,MICROKE...BITS 1213 - OPERATING SYSTEM (PROCESS,THREAD,SYMMETRIC MULTIPROCESSOR,MICROKE...
BITS 1213 - OPERATING SYSTEM (PROCESS,THREAD,SYMMETRIC MULTIPROCESSOR,MICROKE...
 
Mca2010 – operating system
Mca2010 – operating systemMca2010 – operating system
Mca2010 – operating system
 
Chapter 8 : Memory
Chapter 8 : MemoryChapter 8 : Memory
Chapter 8 : Memory
 
CS6401 OPERATING SYSTEMS Unit 2
CS6401 OPERATING SYSTEMS Unit 2CS6401 OPERATING SYSTEMS Unit 2
CS6401 OPERATING SYSTEMS Unit 2
 
Autosar Basics hand book_v1
Autosar Basics  hand book_v1Autosar Basics  hand book_v1
Autosar Basics hand book_v1
 
Os
OsOs
Os
 

Recently uploaded

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 

Recently uploaded (20)

The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 

Bt0070 operating systems

  • 1. Dear students get fully solved assignments Send your semester & Specialization name to our mail id : “ help.mbaassignments@gmail.com ” or Call us at : 08263069601 (Prefer mailing. Call in emergency ) ASSIGNMENT PROGRAM BSc IT SEMESTER SECOND SUBJECT CODE & NAME BT0070, Operating Systems CREDIT 4 BK ID B0954 MAX.MARKS 60 Q. No.1 List the approaches to design operating system structures. Explain any two of them. 2+8=10 Answer: Listing of approaches to design operating system structures:  Layered approach  The kernel based approach  The virtual machine approach  Layered approach  Dijkstra suggested the layered approach to lessen the design and implementation complexities of an operating system. The layered
  • 2. 2 Write short notes on: 1. Process Creation 2. Terminating Process 5+5= 10 Answer: 1. Process Creation During the course of execution, a process may create several new proceses using a create-process system call. The creating process is called a parent process and the new processes are called the children of that process. Each of these new processes may in turn create other processes, forming a tree of processes. Process Termination A process terminates when it finishes executing its last statement and asks the operating system to delete it by using the exit system call. At that time, the process should return the data (output) ti its parent process via the wait system call. All the resources of the process, including physical and virtual memory, open files, and I/O buffers, are deallocated by the operating system. Only a parent process can cause 3 Is it possible to check the condition of mutual exclusion through hardware assistance? If yes, how? 10 Answer: Checking for mutual exclusion is also possible through hardware. Special instructions called Test and Set Lock (TSL) is used for the purpose. An important feature is that the set of instructions used for this purpose is indivisible, that is, they cannot be interrupted during execution. The instruction has the format TSL ACC, IND where ACC is an accumulator register and IND is a memory location used as a flag. Whenever the instruction is Q4
  • 3. 1. Given a total of 5 units of resource type 1 and 4 units of resource type 2, tell whether the following system is in a safe or unsafe state. Show your work. Type 1 Type 2 Process Used Max Used Max P1 1 2 1 3 P2 1 3 1 2 P3 2 4 1 4 5. What is the concept of virtual memory? Why virtual memory is needed? 3+7= 10 Answer: Virtual memory is a technique that allows execution of processes that may not be entirely in memory. In addition, virtual memory allows mapping of a large virtual address space onto a smaller physical memory. It also raises the degree of multi-programming and increases CPU utilization. Because of the above features, users are freed from worrying about memory requirements and availability. Need for Virtual Memory Technique Every process needs to be loaded into 6 What do you mean by Global OS? State the concept of migration and resource allocation in Global OS. 4+6= 10 Answer: Global Operating System (GOS) The NOS is responsible for activities such as memory and process management on the server. The NOS converts a request into a task, schedules and executes it. Memory and processing power in all other computers in the network is not tapped to the maximum by a NOS. This is exactly what the GOS attempts to do. It has a list of processes executing on different machines and the resources needed by each one of them. Relatively free Dear students get fully solved assignments Send your semester & Specialization name to our mail id : “ help.mbaassignments@gmail.com ” or
  • 4. Call us at : 08263069601 (Prefer mailing. Call in emergency )