HSC Computer Science Notes - Vinit Pandey - E4M

🚀 CS Study Hub

Interactive Notes for Class 12th Maharashtra Board

List out any 6 features of Operating System
Features of Operating System:
  • Process Management: Manages process scheduling, creation, and inter-process communication.
  • Memory Management: Tracks every memory location and handles virtual memory.
  • File System Management: Organizes files/directories and handles permissions/security.
  • Device Management: Uses device drivers to facilitate communication between software and hardware.
  • User Interface: Provides CLI (Command Line) or GUI (Graphical User Interface).
  • Networking: Built-in capabilities to communicate over LANs or the Internet.
Write the difference between worm and virus
Worm:
  • A standalone program that replicates itself automatically.
  • Does not need to attach to a host file.
  • Main goal is to propagate and consume network bandwidth.

Virus:
  • Needs to attach itself to an existing executable file (.exe).
  • Requires human action (like opening a file) to spread.
  • Primarily focuses on corrupting, deleting, or modifying data.
Explain the function of the following Operating system a) Virus Detection b) Virus Removal c) Virus Prevention
a) Virus Detection: Identifies the presence of malware by scanning files and system areas for signatures matching known viruses.

b) Virus Removal: Eliminates the threat after detection by quarantining, repairing, or deleting infected files.

c) Virus Prevention: Proactive measures like real-time monitoring and firewalls to block infections before they occur.
--- Sponsored Content ---
What are the functions of memory management state any two types of continuous Real memory management system
Functions of Memory Management:
  • Keep track of all memory locations (free or allocated).
  • Decide memory allocation policy (which process gets memory, when, and where).
  • Use algorithms to allocate or deallocate memory locations.
Contiguous Real Memory Management Systems:
  • Single Contiguous Allocation
  • Fixed Partitioned
  • Variable Partitioned
With reference to process management, explain the terms a) External Priority b) Purchase Priority c) Internal Priority d) Slice Priority
a) External Priority: Specified by the user at the time of initiating the process (e.g., an urgent job).
b) Purchased Priority: Higher priority granted to users who pay a higher rate for faster processing.
c) Internal Priority: Determined by OS scheduling algorithms like Shortest Job First (SJF).
d) Time Slice: A small, fixed interval of time allotted to each process in a multitasking system.
What is a file system? Explain tape based and disk based file system
File System: The method used by an OS to organize and track files on a disk.

Tape-based Systems: Sequential access type. Files are stored on physical reels. Simple but inefficient for searching specific data.

Disk-based Systems: Direct access through physical addresses. Divided into tracks and sectors. Uses a device directory for fast retrieval.
--- Sponsored Content ---
What is VDU? Explain the following terms of VDU Dumb & Intelligent terminal
Visual Display Unit (VDU): A combination of a Keyboard (input) and Video Screen (output).

a) Dumb Terminal: Responsible only for basic input/output; it has no internal processing power.
b) Intelligent Terminal: Contains its own processor and memory; it can process data locally before sending it to the host.
What is Graphical User Interface?
GUI (Graphical User Interface): A visual way to interact with a computer using symbols like icons, menus, and windows rather than typing text commands. It uses a mouse to navigate, making the computer more user-friendly.
Explain the following components of GUI a) Menu bar b) Title bar c) scroll bar
a) Menu Bar: Located at the top of a window; contains pull-down menus for program actions.
b) Title Bar: Displays the name of the program or document and helps identify windows.
c) Scroll Bar: Horizontal or vertical bars used to view information that is currently off-screen.
--- Sponsored Content ---
Explain the following process states a) Running state b) Ready state c) Blocked state
The three primary process states are:
  • Running State: The CPU is currently executing the instructions of the process.
  • Ready State: The process is loaded in memory and waiting for its turn to use the CPU.
  • Blocked State: The process is waiting for an event (like I/O completion) and cannot proceed.
Define security explain the different elements of security
Security: The ability of an OS to enforce control over data storage and transport.

Elements of Security:
  • Confidentiality: Information is not accessed in an unauthorized manner (Read control).
  • Integrity: Information is not modified or deleted in an unauthorized manner (Write control).
  • Availability: Information is available to authorized users at the right time.
Explain following terms in case of process scheduling a) Turn-around Time b) Waiting Time c) Terminal response time d) Event response time
1) Turnaround Time: Total time from job submission to its completion.
2) Waiting Time: Total time a job spends waiting in the ready queue.
3) Terminal Response Time: Time taken for a time-sharing system to respond to a user command.
4) Event Response Time: Time taken for a real-time system to respond to an external event.
--- Sponsored Content ---
Explain virus detection, removal and prevention?
1. Virus Detection: Uses checksums to check file integrity or memory-resident monitors to watch for suspicious I/O.
2. Virus Removal: Scans for known bit patterns (signatures) and deletes or repairs the infected code.
3. Virus Prevention: Practices like using legal software, frequent backups, and running real-time monitors.
What functions are performed by Memory Management of the operating system? State any four memory management system
Memory Management Functions:
  • Tracking free/allocated memory locations.
  • Determining allocation policies.
  • Using hardware-assisted algorithms for allocation.
Memory Management Systems:
  • Contiguous: Single Contiguous, Fixed/Variable Partitioned.
  • Non-Contiguous: Paging, Segmentation.
  • Virtual: Virtual Memory.
What is Computer virus? What are the different method by which virus can infect other programs?
Computer Virus: A program written to infect other programs; it cannot act independently.

Infection Methods:
  • Append: Virus attaches its code to the end of a file.
  • Replace: Virus replaces the original program code.
  • Insert: Virus injected into the middle of a file.
  • Redirect: Changes execution flow to the viral code.
--- Sponsored Content ---
State features of Windows - NT
Features of Windows NT:
  • 32-bit Multitasking and Multi-user OS.
  • Supports Multithreading and Virtual Memory.
  • Symmetric Multiprocessing (SMP): Schedules tasks on any available CPU.
  • NTFS: File system offering fault tolerance, security, and large file support.
What is Virtual memory? Explain any two elements of Virtual memory
Virtual Memory: A technique that allows the execution of processes that are larger than the physical RAM by using the disk as an extension.

Elements:
  • Page Fault: Occurs when a required page is not in RAM, forcing a load from disk.
  • Working Set: The collection of pages currently being used by a process in RAM.
State the various steps involved in the allocation of partition in case of fixed partition memory
Steps in Fixed Partition Allocation:
  • Memory is divided into static, fixed-size slots (partitions) during system startup.
  • A Partition Description Table is created to track status.
  • Processes are loaded into free slots from an input queue.
  • Upon termination, the partition is released for the next process.
Diagram
--- Sponsored Content ---
What is System Call? List any two System Calls for memory management, process management and Information management
System Call: An interface between a program and the OS.
Examples:
  • Memory: Allocate/Free memory.
  • Process: Read/Block process.
  • Information: Create File/Directory.
Explain Multiuser and time sharing Operating system
Multi-user OS: Supports multiple users/processes at the same time (e.g., Mainframes).
Time-sharing OS: Uses CPU scheduling to provide each user a small time slice. The rapid switching makes it appear as if each user has a dedicated CPU.
Give Features of Windows 98 operating system
Features of Windows 98:
  • Support for FAT32 and USB devices.
  • Built-in DVD support and Multi-monitoring (up to 4 screens).
  • Integrated Internet Explorer 4.0 and VPN support.
  • 32-bit OS with high compatibility for DOS and Windows 3.x.
--- Sponsored Content ---
What is Information Management? List any 4 system calls in it.
Information Management (IM): It refers to a set of services that manage the organization, storage, and retrieval of data on various storage devices. It ensures data integrity and controlled access.

System Calls in IM:
  • Create(): To create a new file or directory.
  • Open(): To open an existing file for reading/writing.
  • Read(): To fetch data from a file into a buffer.
  • Write(): To transfer data from a buffer to a file.
  • Close(): To close an opened file and release resources.
Explain the following terms in case of Magnetic Disk: a) Track & Sector b) Seek Time c) Latency Time
a) Track and Sector: A magnetic disk is divided into concentric circles called Tracks. Each track is further divided into smaller parts called Sectors, which are the basic units of data storage.

b) Seek Time: The time required to move the Read/Write head from its current position to the specific track where data is located.

c) Latency Time: (Also called Rotational Latency) The time taken by the desired sector to rotate and come under the Read/Write head after the head has reached the correct track.
Diagram
State any four advantages of Graphical User Interface (GUI).
Advantages of GUI:
  • User Friendly: It is very easy to learn and use, especially for beginners.
  • Visual Interaction: Users interact with icons and menus instead of remembering complex text commands.
  • Multitasking: Users can view and work on multiple programs simultaneously in different windows.
  • WYSIWYG: "What You See Is What You Get" — the screen display matches the final output or printed result.
--- Sponsored Content ---
What is meant by a System Call? How is it used by an application program?
System Call: It is the programmatic way in which a computer program requests a service from the kernel of the operating system.

Usage:
  • Application programs (AP) do not have direct access to hardware.
  • When an AP needs to perform a task like "Read File" or "Print", it executes a System Call.
  • The OS then takes control, performs the privileged task, and returns the result back to the application.