CS Notes Viewer

CS Study Material

Select a chapter to begin viewing notes.

ID: #2
List out any 6 features of Operating System
Process Management: The operating system manages processes, which are running instances of programs. It handles process scheduling, memory management, and inter-process communication.

Memory Management: The operating system manages the computer's memory by allocating and deallocating memory space to different programs and processes. It also handles virtual memory, which allows programs to use more memory than physically available.

File System Management: The operating system provides a file system that organizes and manages files and directories on storage devices. It handles file creation, deletion, and access, as well as file permissions and security.

Device Management: The operating system manages input and output devices such as keyboards, mice, printers, and storage devices. It provides device drivers to facilitate communication between software and hardware.

User Interface: The operating system provides a user interface through which users interact with the computer. This can be a command-line interface (CLI) or a graphical user interface (GUI) that includes windows, icons, menus, and pointers.

Networking: Many modern operating systems have built-in networking capabilities, allowing computers to connect and communicate with each other over local area networks (LANs) or the internet.
Diagram
ID: #5
Write the difference between worm and virus
Worm: A worm is a standalone malicious program that replicates itself and spreads across computer networks or systems, typically without any human interaction.

Worms are designed to self-replicate and spread to other systems or networks. They often have a payload that can perform various malicious actions

Worms are not necessarily focused on file corruption. Their main goal is to propagate and spread across systems or networks.

Virus: A virus is a type of malware that attaches itself to host files or programs and replicates by infecting other files or programs.

Viruses primarily focus on infecting files or programs. When a virus-infected file or program is executed, the virus code activates and can perform actions such as corrupting or deleting files

Viruses can be specifically designed to corrupt or modify files. They can infect files by inserting their malicious code into them
Note: No diagram available for this question.
ID: #6
Explain the function of the following Operating system a) Virus Detection b) Virus Removal c) Virus Prevention
a) Virus Detection: The function of virus detection in an operating system is to identify the presence of viruses or other malicious software on the system. It involves scanning files, programs, and system areas to look for patterns or signatures that match known viruses. The detection process helps in early identification of infected files or potential threats, allowing for timely action to mitigate the risk.

b) Virus Removal: Virus removal refers to the process of eliminating viruses or malware from an infected system. Once a virus is detected, the operating system or antivirus software takes necessary steps to isolate and remove the infected files or programs. This may involve quarantining the infected files, cleaning or repairing them, or deleting them entirely. The goal is to eliminate the virus and restore the system to a clean and secure state.

c) Virus Prevention: Virus prevention aims to proactively safeguard the system from virus infections. It involves implementing various measures and practices to reduce the risk of virus attacks. Operating systems employ multiple techniques for virus prevention
Note: No diagram available for this question.
ID: #7
What are the functions of memory management state any two types of continuous Real memory management system
(1) In general, the memory management modules performs following functions :
(i) To keep track of all memory locations free or allocated and if allocated, to which process and how much.
(ii) To decide memory allocation policy i.e. which process should get how memory when and where.
(iii) To use various techniques and algorithms to allocate or dellocate memory locations. Normally, this is achieved with the help of some special hardware.
(2) The following are the memory management systems :
(A) Contiguous, Real Memory Management System :
(i) Single contiguous
(ii) Fixed partitioned
(iii) Variable partitioned
(B) Non-contiguous, Real Memory Management System :
i) Paging
(ii) Segmentation
(iii) Combined
(C) Non-contiguous, Virtual Memory Management System :
(i) Virtual memory

Note: No diagram available for this question.
ID: #8
With reference to process management, explain the terms a) External Priority b) Purchase Priority c) Internal Priority d) Slice Priority
1) External Priority: - The user specifies the priority externally at the time of initiating the process. If the user does not specify any priority, operating system assumes a default priority for that. If the job is too urgent, system manager permits the process at a higher priority.
2) Purchased Priority: In this priority higher priority processes are charged at a higher rate. The operating system keeps the track of the time used by each process and charges it accordingly.
3) Internal priority: It is decided by scheduling algorithms. Their calculations are based on the current state of the process. The following scheduling algorithms are used for that.
(i) Shortest Job First Algorithm: The job whose expected time for completion is less is executed first.
(ii) Expected remaining time to complete: It is same as SJF at the beginning but as the process progresses the time will change. At regular intervals operating system calculates the expected remaining time for completion and accordingly priority is determined.
4) Time Slice: A short interval of time allotted to each user or program in a multitasking or timesharing system. Time slices are typically in milliseconds.
Note: No diagram available for this question.
ID: #9
What is a file system? Explain tape based and disk based file system
A filesystem is the methods and data structures that an operating system uses to keep track of files on a disk or partition; that is, the way the files are organized on the disk. The word is also used to refer to a partition or disk that is used to store the files or the type of the filesystem.

There are two types of file systems:

Tape-based systems: -It is of sequential type.

Tape-based systems are simple but inefficient
In these systems, files are stored on to reels of physical tapes. Generally, one or more files are stored on to one tape
Tapes are used for transport of data from one computer to another.
Disk-based systems:- It is direct access through physical address

Each disk is divided into tracks and each track is further divided into the number of sectors
A number of tracks and size of sectors is variable. It varies from one drive to another.
A disk has a device directory, indicating, which files are on the disk. The directory lists the
file name, starting address, file length, type of file, time of creation, and time of the last update etc
Note: No diagram available for this question.
ID: #10
What is VDU? Explain the following terms of VDU Dumb & Intelligent terminal
(i) Dumb Terminal
(ii) Intelligent Terminal
Visual Display Unit : Terminal hardware is divided into two parts,
(i) Keyboard: It is used a input medium.
(ii) Video Screen: It is used as output medium.
The combination of above two is called as VDU
(a) Dumb Terminal : It is responsible for basic input and output of data. It does not perform any
processing on input data so it is called as dumb terminal.
(b) Intelligent Terminal : It has powerful hardware and software. It also performs processing on
the data, So it is known as intelligent terminal
Note: No diagram available for this question.
ID: #11
What is Graphical User Interface?
GUI stands for graphical user interface. A GUI, which some folks pronounce as 'gooey', is exactly what it sounds like... a graphical way to do stuff. Simply put, a graphical user interface is a way to communicate what you want to a computer application (or computer operating system) using graphical symbols rather than typing the instructions in. GUIs let you work with picture-like items (icons and arrows for example) to tell the computer what you want from it. And, rather than a keyboard (which can leave you guessing what to type next), you get to scoot around a blocky thing on your desk called a mouse, which makes the arrows and icons scoot around on the screen
Note: No diagram available for this question.
ID: #12
Explain the following components of GUI a) Menu bar b) Title bar c) scroll bar
1) Menu bar :

A menu bar appears normally at the top of a window under window title. It consists of
different main menus, which can be used in the program.
The main menu consists of different submenus options.When one of these menu options is selected, a pull-down menu appears on the screen. A pull-down menu will have an action on the left side and keyboard combination on the right side
2) Title Bar :

It helps to identify each window separately and the program name is displayed in the title bar
3) Scroll Bar :

A scroll bar consists of a horizontal or vertical scroll area with a slider box and an arrow in
a box at each end.
They allow the user to scroll window horizontally and vertically. They are generally used
to look at information which is not currently visible on screen, by scrolling horizontally
and vertically.
Note: No diagram available for this question.
ID: #13
Explain the following process states a) Running state b) Ready state c) Blocked state
a) Running State: When a process is in the running state, it means that the CPU (Central Processing Unit) is actively executing the instructions of that process. In this state, the process is utilizing the CPU resources and executing its designated tasks

b) Ready State: When a process is in the ready state, it is prepared to run and is waiting for the CPU to be allocated to it. Processes in the ready state are loaded into the main memory and are awaiting their turn to execute.

c) Blocked State: When a process is in the blocked state (also known as the waiting or blocked/sleeping state), it is temporarily unable to proceed with its execution. The process enters this state when it encounters an event that causes it to halt, such as waiting for user input, waiting for I/O operations to complete, or waiting for a certain condition to be satisfied
Note: No diagram available for this question.
ID: #14
Define security explain the different elements of security
Security: It is concerned with the ability of an operating system to enforce control over the storage and transportation of data in and between the objects that the operating system supports. In the multi-user environment, security concepts are very important.

Elements of security :

1) Confidentiality:-Information is not accessed in an unauthorized manner.(Read) i.e., by
controlling read operations.

2) Integrity:-Information is not deleted in an unauthorized manner (Write) i.e., by controlling write operations.

3) Availability:- Information is available to authorized users at the right time
Note: No diagram available for this question.
ID: #15
Explain following terms in case of process scheduling a) Turn-around Time b) Waiting Time c) Terminal response time d) Event response time
1) Turnaround time: Turnaround time is the elapsed time between the time a program or a job is
submitted and the time when it is job completed.

2) Waiting time: It is the time job spends in the waiting queue before execution

3) Terminal Response time: In the time-sharing system, Terminal response time is the time to
respond with an answer or result to a question and it depends on a degree of multiprogramming, the efficiency of hardware with OS and policy of OS to allocate resources.

4) Event Response time: In the real-time system, event response time is the time to respond with an event.
Note: No diagram available for this question.
ID: #16
Explain virus detection, removal and prevention?
(1) Virus detection
(i) Normally virus detection program checks integrity of binary files. It maintains a checksum on each file. At regular frequency detection program calculates checksum and matches with original one. If there is mismatch then that program may be infected.
(ii) Some programs reside in the memory and continuously monitor memory and I/O operations against virus.


(2) Virus removal
There are some viruses whose bit pattern in the code can be predicted. The virus removal program scans the disk for the patterns of known viruses and on detection it removes them.


(3) Virus prevention
For prevention of virus the user can take the following precautions
(i) Always buy legal copies of software.
(ii) Take frequent backups of data
(iii) Run monitor programs frequently to detect virus.
Note: No diagram available for this question.
ID: #17
What functions are performed by Memory Management of the operating system? State any four memory management system
(1) To keep track of all memory locations free or allocated and if allocated, to which process and how much.
(2) To decide memory allocation policy i.e., which process should get how much memory when and where.
(3) To use various techniques and algorithms to allocate or deallocate memory locations. Normally, this is achieved with the help of some special hardware.

The following are the memory management systems :
(A) Contiguous, Real Memory Management system :
(a) Single contiguous
(b) Fixed partitioned
(c) Variable partitioned
(B) Non- contiguous, Real Memory Management System :
(a) Paging
(b) Segmentation
(c) Combined
(C) Non - contiguous, Virtual Memory Management System :
(a) Virtual memory
Note: No diagram available for this question.
ID: #18
What is Computer virus? What are the different method by which virus can infect other programs?
Computer Virus: It is not a complete program by itself. It can not act independently. It is a program written with a clear intention of infecting other programs.

Infection Methods:
(a) Append: In this method viral code appends itself to the unaffected program.
(b) Replace: In this method viral code replaces original executable program completely or partially.
(c) Insert: In this method the viral code is inserted in the body of an executable code to carry out some funny actions.
(d) Delete: In this case viral code deletes some codes from executable program.
(e) Redirect: In this case the normal control flow of a program is changed to execute some other code.
Note: No diagram available for this question.
ID: #19
State features of Windows - NT
The features of Windows NT are as follows :-
(1) It is multitasking, multi-user and multithreading operating system.
(2) It also supports virtual memory management system to allow multiprogramming.
(3) Symmetric multiprocessing allows to it to schedule various tasks on any CPU in a multiprocessor system.
(4) It uses New Technology File System which implements fault tolerance, security and support for large files.
(5) It is 32 bit operating system.
Note: No diagram available for this question.
ID: #20
What is Virtual memory? Explain any two elements of Virtual memory
Virtual memory:

1. Virtual memory is an attempt, which makes the execution of the processes possible, which may completely not in the main memory. Some part of the process may be on disk.

2. The MM techniques are simple to implement but the major drawback is that if the physical memory is limited then number of processes it can hold at any time i.e. degree of multiprogramming reduces. For this concept of virtual memory is introduced.

Elements of virtual memory

1. Locality of reference

2. Page fault

3. Working set

4. Page replacement policy

5. Dirty page

6. Demand paging

Page fault : When a page, which is not in main memory is referenced, then a page fault arises. At this time
the O.S loads that page in main memory.

Working set : The set of pages in physical memory which are actively referred to any moment is called as working set. Working set helps to decide page replacement policy.
Note: No diagram available for this question.
ID: #21
State the various steps involved in the allocation of partition in case of fixed partition memory
(1) It is the simplest method for memory allocation. It divides the memory into fixed size sections. These sections are called as partitions. Each partition may contain exactly one process. When the partition is free, a process is selected from the input queue and loaded into free partitions. When the process terminates, the partition becomes available for another process.
(2) The partitions are fixed at the time of system generation. It is the process of tailoring the operating system to specific requirements. After declaring partitions the operating system creates a partition description table.

(3) The Memory Map for processes is as follows:

Process: P0-(0-200K)
Process: P1-(200-700K)
Process: P2-(700-800K)
Process: P3-(800-1100K)
Process: P4-(1100-1500K)

Diagram
ID: #22
What is System Call? List any two System Calls for memory management, process management and Information management
System calls : System call provides the interface between process and the operating system. These calls are generally available as assembly language instructions.

List of system calls for memory management :

1. To allocate a chunk of memory to a process.

2. To free chunk of memory from a process.

List of system calls for information management :

1. Create a file

2. Create a directory

List of system calls for process management :

1. Read a process

2. Block a process
Note: No diagram available for this question.
ID: #23
Explain Multiuser and time sharing Operating system
Multi user operating system : In multi user operating system support multiple processes at the same time. Time-sharing systems are multi-user systems. Most batch processing systems for mainframe computers may also be considered "multi-user", to avoid leaving the CPU idle while it waits for I/O operations to complete.

Multi-user software is software that allows access by multiple users of a computer.

Time sharing operating system : It uses CPU scheduling and multiprogramming to provide each user with a small portion of time - shared computer. Each user has a separate program in memory. When program executes, it executes for only short time before it either finishes or needs to perform I/O.
Note: No diagram available for this question.
ID: #24
Give Features of Windows 98 operating system
Microsoft announced with this new system software Version 4.10 the revised version of Windows 95. The operating system Windows 98 contains as innovation mainly detail improvements and bug fixes. The hardware component is enhanced with USB support improved and the operation of several monitors is possible now. Windows 98 is prepared for DVD movies, for the view of DVD Movies a separate software must be installed.
The update to the newest Windows Release is supported if Windows 3. x or Windows 95 is already installed.

As a file system for the installation of Windows 98 FAT32 is recommended. If the access to other file systems is needed are tools of third party manufacturers required which usually offer a free software with read access. Such tools are available for NTFS and the Linux file system ext2. For the professional file system NTFS exists a driver of Sysinternals which is integrated after the installation in the operating system. For the successful installation system files are needed by Windows NT.

Windows 98 can be updated to DirectX 9.0 and the Internet Explorer 6.

Features
- extended support for the connection to networks
- integrated Internet Explorer 4.0
- web optimized, networking through VPN
- Internet Connection Sharing (ICS)

Area of application
- home user
- PC Games
- Office use
- network client

Structure informations
- 32-bit operating system, with 16 Bit Code
- up to 512 mbyte RAM adressable
- File size up to 4 gbyte

System environment
- Minimum Hardware Requierements: 16 mbyte RAM, 300 mbyte harddisk storage
- Active Desktop for the Web integration in Windows
- New driver model WDM (Win32 Driver Model), developed for the same driver base for Windows NT and 98 in 1996
- Task planer, time controlled start from programs
- Mayntenance assistant, harddisk maintains
- game interface DirectX 5.0
- multi monitoring Support (up to 4)
- File system FAT16, better use FAT32, access to NTFS and Linux ext2 file system with 3rd party tools
- preemptive multitasking for 32-bit applications
- cooperative multitasking for 16-bit programs
- ACPI Power save mode partly supported (except of Suspend to Disk)
- x86 CPUs and compatible

Features
- integrated ICM (Image Color Management)
- Plug and play, support for modern hardware like USB, Firewire IEEE 1394
- high compatibility to DOS, Windows 3.x and limited NT
- very high number of software and device drivers
Note: No diagram available for this question.