1. Does a process incur more execution overhead compared to a thread? Justify your answer.
[4]
[4]
[4]
[4]
[4]
6. What is the difference between a long-term scheduler and a short-term scheduler?
[4]
7. How can a single copy of a text editor be used to serve multiple users in a time-sharing system?
[4]
8. What is TLB? Find out the effective memory-access time with an 80% hit ratio and the following access times:
TLB access time: 20ns;
MM access time: 100ns
[8]
9. Describe the public-key encryption scheme and mention how is it advantageous to the data-encryption standard.
[10]
10. Consider the following page reference during a given time interval for a memory consisting of 5 frames: y,c,z,c,d,a,y,a,e,a,y,f,d,e. Using the i) FIFO replacement strategy and ii) the LRU replacement strategy compare the results. Repeat both FIFO and LRU replacement strategies for memory with 3 frames and same page reference pattern. Comment on the findings and draw a conclusion justifying the adoption of a particular replacement strategy.
[18]
11. What does ‘init’ do? What happens to the parent process id of a child when the parent terminates before its child? When does a child become ‘zombie’?
[8]
12. With reference to Unix when do the following situations occur?
i) Single process table entry contains pointers to the same file table entry.
ii) Different file table entries point to the same i-node table entry.
iii) Shell ‘forks’ a copy of itself and ‘waits’ for the child to terminate.
i) Single process table entry contains pointers to the same file table entry.
ii) Different file table entries point to the same i-node table entry.
iii) Shell ‘forks’ a copy of itself and ‘waits’ for the child to terminate.
[6]
13. How does CPU time-slice affect the Round-Robin algorithm?
[4]
14. Show and explain an implementation of the classical producer-consumer (producer produces an item, keeps it in a buffer from where the consumer is picking it up) problem using semaphore.
[10]
15. What is dynamic loading? Mention its advantage. How is dynamic linking performed? Mention any disadvantage that you can think of for both the schemes.
[8]
16. What is meant by a domain and the rights on it? Describe a Capability list and ways of protecting it from user tampering.
[9]
17. Rewrite the following code introducing code parallelism wherever applicable:
For i = 1 to k
a(i) = b(i) + c(i)
For j = 1 to k
d(j) = x(j) – y(j)
For p = 1 to k
x(p) = y(p) + b(p)
read(m,n,o,r)
q = m*n + r/o
write(q)
For i = 1 to k
a(i) = b(i) + c(i)
For j = 1 to k
d(j) = x(j) – y(j)
For p = 1 to k
x(p) = y(p) + b(p)
read(m,n,o,r)
q = m*n + r/o
write(q)
[4]
18. Using preemptive SJF(shortest-job-first) algorithm draw the Gannt chart and calculate the average waiting time for the following processes:
PROCESS | Arrival time | Burst time |
P0 | 0 | 6 |
P1 | 2 | 4 |
P2 | 3 | 10 |
P3 | 7 | 9 |
[5]
19. Where and how “bit vector/table” is used? What are the advantages and disadvantages of the technique?
[5]
20. What is deadlock? How can deadlock be prevented by not allowing “Hold and Wait” ? Is it a feasible policy?
[5]
21. How can synchronization be achieved when two processes communicate by message passing?
[5]
22. Provide a programming example of multithreading giving improved performance over a single-threaded solution.
[3]
No comments:
Post a Comment