Get premium membership and access revision papers, questions with answers as well as video lessons.

Bit 1106 Operating System Question Paper

Bit 1106 Operating System 

Course:Bachelor Of Science In Information Technology

Institution: Kca University question papers

Exam Year:2014



1
UNIVERSITY EXAMINATIONS: 2013/2014 ORDINARY EXAMINATION FOR THE BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY BIT 1106 OPERATING SYSTEM DATE: APRIL, 2014 TIME: 2 HOURS INSTRUCTIONS: Answer Question ONE and any other TWO QUESTION ONE
(a) Explain the following terms:
(i) Clock Interrupt [2 Marks]
(ii) Trap [2 Marks]
(iii)Device driver [2 Marks]
(iv) Critical race condition [3 Marks]
(b) Describe the function of the kernel in process management. [5 Marks]
(c) Briefly explain five factors to consider when selecting a file design method
[5 Marks]
(d) Identify five principles of I/O software [5 Marks]
(e) Discuss six functions of virtual memory. [6 Marks]
QUESTION TWO
(a) Briefly describe each of the following terms as used in paging.
(i) Page fault [2 Marks]
(ii) Virtual address space [2 Marks]
(iii)Physical address space [2 Marks]
(b) With the aid of a diagram, explain the concept of segmentation as used in memory management scheme. [3 Marks]
(c) Describe the objectives of I/O management. [5 Marks]
2
(d) Discuss the following scheduling algorithms Multi-level queue
[2Marks] ii. Event driven [2Marks] iii. FCFS [2Marks] QUESTION THREE
(a) Explain the following terms with respect to scheduling and performance maximization:
(i) Throughput [2 Marks]
(ii) Turnaround time [2 Marks] (iii) Response time [2 Marks]
(b) With the aid of a diagram discuss the five process state in operating systems.
[5 Marks]
(c) Give the benefits of Direct Memory Access (DMA) in I/O device management.
[4 Marks]
(d) Briefly explain five factors that may lead to a process switch. [5 Marks]
QUESTION FOUR
(a) Explain the following with reference to file management;
(i) file security [2 Marks]
(ii) file integrity [2 Marks]
(iii)File map [2 Marks]
(b) Give the benefits of using directories in the file system [6 Marks]
(c) Discuss in detail four file organization methods. [8 Marks]
3
QUESTION FIVE
(a) Security goals of any computer system are decided by its security policies. Briefly explain three computer security goals that can be set in an operating system.
[6 Marks]
(b) State four types of security threats to consider when designing and implementing any operating system. [4 Marks]
(c) Discuss the objectives of I/O management. [8 Marks]
(d) Describe device controller. [2 Marks]






More Question Papers


Popular Exams



Return to Question Papers