Flowchart: Alternate Process: DECEMBER 2008Code: DC14                                                                             Subject: SYSTEM SOFTWARE &

                                                                                                                OPERATING SYSTEMS

Time: 3 Hours                                                                                                     Max. Marks: 100

 

NOTE: There are 9 Questions in all.

·      Question 1 is compulsory and carries 20 marks. Answer to Q. 1. must be written in the space provided for it in the answer book supplied and nowhere else.

·      Out of the remaining EIGHT Questions answer any FIVE Questions. Each question carries 16 marks.

·      Any required data not explicitly given, may be suitably assumed and stated.

 

 

Q.1       Choose the correct or best alternative in the following:                                         (2x10)

       

a.    Which of the following are language processors.

                 

                                                                 (A) Assembler                                   (B) Compiler

                                                                 (C) Interpreter                        (D) All of the above

 

b.   Virtual memory can be implemented with

 

                                                                 (A) Segmentation                                  (B) Paging

                                                                 (C) None                                   (D) all of the above          

 

 c.   Recognition of basic syntactic constructs through reductions, this task

      is performed by

                  

                                                                 (A) Lexical analysis                   (B) Syntax analysis

                                                                 (C) Semantic analysis                (D) Structure analysis

 

d.   A grammar for a programming language is a formal description of

 

                                                                 (A) Syntax                                       (B) Semantics

                                                                 (C) Structure                                          (D) Code

 

e.    ____________ is a technique of temporarily removing inactive programs from the memory of computer system

 

                                                                 (A) Swapping                                    (B) Spooling

                                                                 (C) Semaphore                                (D) Scheduler

 

f.    ___________  is a technique of improving the priority of process waiting in Queue for CPU allocation

 

      (A) Starvation                                     (B) Ageing

                                                                 (C) Revocation                               (D) Relocation 

 

g.    ________ is the time required by a sector to reach below read/write  head.

 

                                                                 (A) Seek Time                            (B) Latency Time

                                                                 (C) Access time                                      (D) None

 


h.    Which of the following is most general phase structured grammar?

 

                                                                 (A) Context – Sensitive                        (B) Regular 

      (C) Context – Free                             (D) None of the above

 

 i.    File record length

 

      (A) Should always be fixed                 

                                                                 (B) Should always be variable

                                                                 (C) Depends upon the size of file                           

                                                                 (D) Should be chosen to match the data characteristics.

 

j.    A public key encryption system

 

      (A) Allows only the correct receiver to decode the data

                                                                 (B) Allows only one to decode the transmission.

                                                                 (C) Allows only the correct sender to decode the data.

                                                                 (D) Does not encode the data before transmitting it.

 

 

 

 

Answer any FIVE Questions out of EIGHT Questions.

Each question carries 16 marks.

 

 

  Q.2     a.   Describe the necessary conditions for Deadlock.                                                (8)

 

             b.   Define a critical section. List and explain the properties which implementation of a critical section for a data item, should posses.                             (8)

 

  Q.3     a.   What is a Process Scheduling? Explain the different sub-functions of Process Scheduling.                (8)

 

             b.   Describe the essential properties of the following operating systems                        

                   Real Time and Distributed Operating System                                                      (8)

 

  Q.4     a.   Describe Data structures used during passes of assembler and their use.           (10)

 

             b.   What is parsing and specify the goals of parsing                                                  (6)

 

  Q.5     a.   Write short note on code optimization  (8)

 

             b.   Explain the Features of Major scheduling algorithms                                            (8)

 

  Q.6     a.   What is relevance of Inter-process communication? Discuss the various implementation issues which arise in IPC (Inter-process Communication).    (7)

 

             b.   List the criteria on the basis of which data structures used in language processing can be classified.                                                             (3)

 

             c.   What is Encryption of data and why it is required?                                             (6)

 

  Q.7     a.   Discuss various software tools used for program development.                            (8)

 

             b.   Explain UNIX file system.                                                                                 (8)

 

  Q.8     a.   Differentiate between logical address and physical address.                                 (4)

 

            b.   Explain the concept of Remote Procedure Call. How is it implemented?              (8)

 

             c.   What are Language Processor Development Tools (LPDTs)? Explain through schematic diagram. Name the widely used LPDTs.                            (4)

 

  Q.9     a.   Explain the following terms                                                                                     

                          (i)                                                  Overlays                                                                (4)

                   (ii)  macro definition and call                                                                              (4)

 

             b.   What criteria should be adopted for choosing type of file organization                 (8)