List out any 6 features of Operating System
Features of Operating System:
- Process Management: Manages process scheduling, creation, and inter-process communication.
- Memory Management: Tracks every memory location and handles virtual memory.
- File System Management: Organizes files/directories and handles permissions/security.
- Device Management: Uses device drivers to facilitate communication between software and hardware.
- User Interface: Provides CLI (Command Line) or GUI (Graphical User Interface).
- Networking: Built-in capabilities to communicate over LANs or the Internet.
Write the difference between worm and virus
Worm:
Virus:
- A standalone program that replicates itself automatically.
- Does not need to attach to a host file.
- Main goal is to propagate and consume network bandwidth.
Virus:
- Needs to attach itself to an existing executable file (.exe).
- Requires human action (like opening a file) to spread.
- Primarily focuses on corrupting, deleting, or modifying data.
Explain the function of the following Operating system a) Virus Detection b) Virus Removal c) Virus Prevention
a) Virus Detection: Identifies the presence of malware by scanning files and system areas for signatures matching known viruses.
b) Virus Removal: Eliminates the threat after detection by quarantining, repairing, or deleting infected files.
c) Virus Prevention: Proactive measures like real-time monitoring and firewalls to block infections before they occur.
b) Virus Removal: Eliminates the threat after detection by quarantining, repairing, or deleting infected files.
c) Virus Prevention: Proactive measures like real-time monitoring and firewalls to block infections before they occur.
What are the functions of memory management state any two types of continuous Real memory management system
Functions of Memory Management:
- Keep track of all memory locations (free or allocated).
- Decide memory allocation policy (which process gets memory, when, and where).
- Use algorithms to allocate or deallocate memory locations.
- Single Contiguous Allocation
- Fixed Partitioned
- Variable Partitioned
With reference to process management, explain the terms a) External Priority b) Purchase Priority c) Internal Priority d) Slice Priority
a) External Priority: Specified by the user at the time of initiating the process (e.g., an urgent job).
b) Purchased Priority: Higher priority granted to users who pay a higher rate for faster processing.
c) Internal Priority: Determined by OS scheduling algorithms like Shortest Job First (SJF).
d) Time Slice: A small, fixed interval of time allotted to each process in a multitasking system.
b) Purchased Priority: Higher priority granted to users who pay a higher rate for faster processing.
c) Internal Priority: Determined by OS scheduling algorithms like Shortest Job First (SJF).
d) Time Slice: A small, fixed interval of time allotted to each process in a multitasking system.
What is a file system? Explain tape based and disk based file system
File System: The method used by an OS to organize and track files on a disk.
Tape-based Systems: Sequential access type. Files are stored on physical reels. Simple but inefficient for searching specific data.
Disk-based Systems: Direct access through physical addresses. Divided into tracks and sectors. Uses a device directory for fast retrieval.
Tape-based Systems: Sequential access type. Files are stored on physical reels. Simple but inefficient for searching specific data.
Disk-based Systems: Direct access through physical addresses. Divided into tracks and sectors. Uses a device directory for fast retrieval.
What is VDU? Explain the following terms of VDU Dumb & Intelligent terminal
Visual Display Unit (VDU): A combination of a Keyboard (input) and Video Screen (output).
a) Dumb Terminal: Responsible only for basic input/output; it has no internal processing power.
b) Intelligent Terminal: Contains its own processor and memory; it can process data locally before sending it to the host.
a) Dumb Terminal: Responsible only for basic input/output; it has no internal processing power.
b) Intelligent Terminal: Contains its own processor and memory; it can process data locally before sending it to the host.
What is Graphical User Interface?
GUI (Graphical User Interface): A visual way to interact with a computer using symbols like icons, menus, and windows rather than typing text commands. It uses a mouse to navigate, making the computer more user-friendly.
Explain the following components of GUI a) Menu bar b) Title bar c) scroll bar
a) Menu Bar: Located at the top of a window; contains pull-down menus for program actions.
b) Title Bar: Displays the name of the program or document and helps identify windows.
c) Scroll Bar: Horizontal or vertical bars used to view information that is currently off-screen.
b) Title Bar: Displays the name of the program or document and helps identify windows.
c) Scroll Bar: Horizontal or vertical bars used to view information that is currently off-screen.
Explain the following process states a) Running state b) Ready state c) Blocked state
The three primary process states are:
- Running State: The CPU is currently executing the instructions of the process.
- Ready State: The process is loaded in memory and waiting for its turn to use the CPU.
- Blocked State: The process is waiting for an event (like I/O completion) and cannot proceed.
Define security explain the different elements of security
Security: The ability of an OS to enforce control over data storage and transport.
Elements of Security:
Elements of Security:
- Confidentiality: Information is not accessed in an unauthorized manner (Read control).
- Integrity: Information is not modified or deleted in an unauthorized manner (Write control).
- Availability: Information is available to authorized users at the right time.
Explain following terms in case of process scheduling a) Turn-around Time b) Waiting Time c) Terminal response time d) Event response time
1) Turnaround Time: Total time from job submission to its completion.
2) Waiting Time: Total time a job spends waiting in the ready queue.
3) Terminal Response Time: Time taken for a time-sharing system to respond to a user command.
4) Event Response Time: Time taken for a real-time system to respond to an external event.
2) Waiting Time: Total time a job spends waiting in the ready queue.
3) Terminal Response Time: Time taken for a time-sharing system to respond to a user command.
4) Event Response Time: Time taken for a real-time system to respond to an external event.
Explain virus detection, removal and prevention?
1. Virus Detection: Uses checksums to check file integrity or memory-resident monitors to watch for suspicious I/O.
2. Virus Removal: Scans for known bit patterns (signatures) and deletes or repairs the infected code.
3. Virus Prevention: Practices like using legal software, frequent backups, and running real-time monitors.
2. Virus Removal: Scans for known bit patterns (signatures) and deletes or repairs the infected code.
3. Virus Prevention: Practices like using legal software, frequent backups, and running real-time monitors.
What functions are performed by Memory Management of the operating system? State any four memory management system
Memory Management Functions:
- Tracking free/allocated memory locations.
- Determining allocation policies.
- Using hardware-assisted algorithms for allocation.
- Contiguous: Single Contiguous, Fixed/Variable Partitioned.
- Non-Contiguous: Paging, Segmentation.
- Virtual: Virtual Memory.
What is Computer virus? What are the different method by which virus can infect other programs?
Computer Virus: A program written to infect other programs; it cannot act independently.
Infection Methods:
Infection Methods:
- Append: Virus attaches its code to the end of a file.
- Replace: Virus replaces the original program code.
- Insert: Virus injected into the middle of a file.
- Redirect: Changes execution flow to the viral code.
State features of Windows - NT
Features of Windows NT:
- 32-bit Multitasking and Multi-user OS.
- Supports Multithreading and Virtual Memory.
- Symmetric Multiprocessing (SMP): Schedules tasks on any available CPU.
- NTFS: File system offering fault tolerance, security, and large file support.
What is Virtual memory? Explain any two elements of Virtual memory
Virtual Memory: A technique that allows the execution of processes that are larger than the physical RAM by using the disk as an extension.
Elements:
Elements:
- Page Fault: Occurs when a required page is not in RAM, forcing a load from disk.
- Working Set: The collection of pages currently being used by a process in RAM.
State the various steps involved in the allocation of partition in case of fixed partition memory
Steps in Fixed Partition Allocation:
- Memory is divided into static, fixed-size slots (partitions) during system startup.
- A Partition Description Table is created to track status.
- Processes are loaded into free slots from an input queue.
- Upon termination, the partition is released for the next process.
What is System Call? List any two System Calls for memory management, process management and Information management
System Call: An interface between a program and the OS.
Examples:
Examples:
- Memory: Allocate/Free memory.
- Process: Read/Block process.
- Information: Create File/Directory.
Explain Multiuser and time sharing Operating system
Multi-user OS: Supports multiple users/processes at the same time (e.g., Mainframes).
Time-sharing OS: Uses CPU scheduling to provide each user a small time slice. The rapid switching makes it appear as if each user has a dedicated CPU.
Time-sharing OS: Uses CPU scheduling to provide each user a small time slice. The rapid switching makes it appear as if each user has a dedicated CPU.
Give Features of Windows 98 operating system
Features of Windows 98:
- Support for FAT32 and USB devices.
- Built-in DVD support and Multi-monitoring (up to 4 screens).
- Integrated Internet Explorer 4.0 and VPN support.
- 32-bit OS with high compatibility for DOS and Windows 3.x.
What is Information Management? List any 4 system calls in it.
Information Management (IM): It refers to a set of services that manage the organization, storage, and retrieval of data on various storage devices. It ensures data integrity and controlled access.
System Calls in IM:
System Calls in IM:
- Create(): To create a new file or directory.
- Open(): To open an existing file for reading/writing.
- Read(): To fetch data from a file into a buffer.
- Write(): To transfer data from a buffer to a file.
- Close(): To close an opened file and release resources.
Explain the following terms in case of Magnetic Disk: a) Track & Sector b) Seek Time c) Latency Time
a) Track and Sector: A magnetic disk is divided into concentric circles called Tracks. Each track is further divided into smaller parts called Sectors, which are the basic units of data storage.
b) Seek Time: The time required to move the Read/Write head from its current position to the specific track where data is located.
c) Latency Time: (Also called Rotational Latency) The time taken by the desired sector to rotate and come under the Read/Write head after the head has reached the correct track.
b) Seek Time: The time required to move the Read/Write head from its current position to the specific track where data is located.
c) Latency Time: (Also called Rotational Latency) The time taken by the desired sector to rotate and come under the Read/Write head after the head has reached the correct track.
State any four advantages of Graphical User Interface (GUI).
Advantages of GUI:
- User Friendly: It is very easy to learn and use, especially for beginners.
- Visual Interaction: Users interact with icons and menus instead of remembering complex text commands.
- Multitasking: Users can view and work on multiple programs simultaneously in different windows.
- WYSIWYG: "What You See Is What You Get" — the screen display matches the final output or printed result.
What is meant by a System Call? How is it used by an application program?
System Call: It is the programmatic way in which a computer program requests a service from the kernel of the operating system.
Usage:
Usage:
- Application programs (AP) do not have direct access to hardware.
- When an AP needs to perform a task like "Read File" or "Print", it executes a System Call.
- The OS then takes control, performs the privileged task, and returns the result back to the application.