MCA2010 – OPERATING SYSTEM

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

 

 

(FALL 2014) ASSIGNMENT

 

PROGRAM Master of Science in Information Technology(MSc IT)Revised Fall 2011
SEMESTER 2
SUBJECT CODE & NAME MCA2010 – OPERATING SYSTEM
CREDIT 2
BK ID B1405
MAX.MARKS 60

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

 

 

1 Differentiate between Distributed Systems and Real-time Systems.

Answer : A distributed real-time system composes two challenging sets of properties which are imposed by the problem domain or the solution domain (or both.)

 

Distributed

 

A distributed system links a number of independent computing entities with local properties by way of a communication mechanism. As a consequence, algorithms and other design components must take into consideration the synchrony and the failure model. A useful summary (not entirely objective) of distributed computing concerns is included in Deutsch’s Eight Fallacies of Distributed Computing. (See this useful exposition.) All of

 

 

 

 

2 Explain the different process states.

 

Answer : A process is a program in execution. The execution of a process must progress in a sequential fashion. Definition of process is following.

A process which is Executed by the Process have various States, the State of the Process is also called as the Status of the process, The Status includes whether the Process has Executed or Whether the process is Waiting for Some input and output from the user and whether the Process is Waiting for the CPU to Run the Program after the Completion of

 

 

3 Define Deadlock. Explain necessary conditions for deadlock.

 

Answer : A deadlock is a situation in which two computer programs sharing the same resource are effectively preventing each other from accessing the resource, resulting in both programs ceasing to function. The earliest computer operating systems ran only one program at a time. Eventually some operating systems offered dynamic allocation of resources. Programs could request further allocations of resources after they had begun

 

 

 

4 Differentiate between Sequential access and direct access methods.

Answer : The hypertext and hyperlink exemplify the direct-access paradigm and are a significant improvement over the more traditional, book-based model of sequential access.

 

(Direct access can also be called random access, because it allows equally easy and fast access to any randomly selected destination. Somewhat like traveling by a Star Trek transporter instead of driving along the freeway and passing the exits one at a time, which is what you get with sequential access.)

 

In a normal, physical book, the reader is supposed

 

 

5 Differentiate between Daisy chain bus arbitration and Priority encoded bus arbitration.

 

Answer : In most mini- and mainframe computer systems, a great deal of input and output occurs between the disk system and the processor. It would be very inefficient to perform these operations directly through the processor; it is much more efficient if such devices, which can transfer data at a very high rate, place the data directly into the memory, or take the data directly from the processor without direct intervention from the processor. I/O performed in this way is usually called direct memory access, or DMA. The controller for a device

 

 

6 Differentiate between encryption and decryption. What are the two basic methods for encryption?

Answer : Encryption and decryption are both methods used to ensure the secure passing of messages and other sensitive documents and information.

 

Encryption basically means to convert the message into code or scrambled form, so that anybody who does not have the ‘key’ to unscramble the code, cannot view it. This is usually done by using a ‘cipher’. A cipher is a type of algorithm used in encryption that uses a certain described method to scramble the data. The cipher can only be ‘deciphered’ with a ‘key’. A key is the actual ‘described method’ that was used to scramble the data, and

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

 

Leave a Reply