Saturday 24 June 2017

bca211 smu bca spring 2017 (jul/aug 2017 exam) IInd sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
If urgent then call us on 08791490301

ASSIGNMENT DRIVE - SPRING 2017
PROGRAM - Bachelor of Computer Application - BCA
SEMESTER - I
SUBJECT CODE & NAME - BCA211 – Operating System
BK ID B1405 NUMBER OF ASSIGNMENTS, CREDITS & MARKS 2, 4 Credits, 30 marks each
Assignment Set -1 Questions
Q1 What are the components of UNIX Kernel? 10
Answer:-
The UNIX kernel s divided in to three modes: user mode, kernel mode, and hardware. The user mode contains user programs which can access the services of the kernel components using system call interface.
The kernel mode has four major

Q2. Discuss First-Come-First-Served scheduling algorithm. 10
Answer:-
This is one of the brute force algorithms. A process that requests for the CPU first is allocated the CPU first. Hence, the name first come first serve.  The FCFS algorithm is implemented by using a first-in-first-out (FIFO) queue structure for the ready

Q3 a) What are the necessary conditions for deadlock to occur? b) Write a note on Resource Allocation Graph. 4+6
 Answer:-
a)
A deadlock occurs in a system if the following four conditions hold simultaneously:
1)      Mutual exclusion: At least one of the


Assignment Set -2 Questions
Q1 Explain demand paging in virtual memory system. 10
Answer:-
Demand paging is similar to paging with swapping (Refer figure below). When a process is to be executed then only that page of the process, which needs to be currently executed, is swapped into memory. Thus, only necessary pages of

Q2 Discuss the concept of Direct Memory Access.  10
Answer:-
In most mini and mainframe computer systems, a great deal of input and output occurs between the disk system and the processor. It would be very inefficient to perform these operations directly through the processor; it is much more efficient if such devices, which can transfer data at a very high rate, place the data directly into the memory, or take the data directly

Q3 What are the different forms of Encryption in Distributed System? 10
Answer:-
Encryption in a distributed environment can be of two forms:
  End-to-end encryption
 Link encryption
 If end-to-end encryption is used, the encryption / decryption devices are needed only at the ends. Data from source to destination moves on the network in

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
If urgent then call us on 08791490301



No comments:

Post a Comment