Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs
125/subject
If urgent
then call us on 08791490301
ASSIGNMENT DRIVE - SPRING 2017
PROGRAM - Bachelor of Computer Application
- BCA
SEMESTER - I
SUBJECT CODE & NAME - BCA211 –
Operating System
BK ID B1405 NUMBER OF ASSIGNMENTS,
CREDITS & MARKS 2, 4 Credits, 30 marks each
Assignment
Set -1 Questions
Q1
What are the components of UNIX Kernel? 10
Answer:-
The UNIX kernel s divided in to three
modes: user mode, kernel mode, and hardware. The user mode contains user
programs which can access the services of the kernel components using system
call interface.
The kernel mode has four major
Q2.
Discuss First-Come-First-Served scheduling algorithm. 10
Answer:-
This is one of the brute force
algorithms. A process that requests for the CPU first is allocated the CPU
first. Hence, the name first come first serve.
The FCFS algorithm is implemented by using a first-in-first-out (FIFO)
queue structure for the ready
Q3
a) What are the necessary conditions for deadlock to occur? b) Write a note on
Resource Allocation Graph. 4+6
Answer:-
a)
A deadlock occurs in a system if the
following four conditions hold simultaneously:
1) Mutual exclusion: At least one of the
Assignment
Set -2 Questions
Q1
Explain demand paging in virtual memory system. 10
Answer:-
Demand paging is similar to paging with
swapping (Refer figure below). When a process is to be executed then only that
page of the process, which needs to be currently executed, is swapped into
memory. Thus, only necessary pages of
Q2
Discuss the concept of Direct Memory Access.
10
Answer:-
In most mini and mainframe computer
systems, a great deal of input and output occurs between the disk system and
the processor. It would be very inefficient to perform these operations
directly through the processor; it is much more efficient if such devices,
which can transfer data at a very high rate, place the data directly into the
memory, or take the data directly
Q3
What are the different forms of Encryption in Distributed System? 10
Answer:-
Encryption in a distributed environment
can be of two forms:
End-to-end
encryption
Link
encryption
If
end-to-end encryption is used, the encryption / decryption devices are needed
only at the ends. Data from source to destination moves on the network in
Get fully solved assignment. Buy
online from website
online store
or
plz drop a mail with your sub
code
we will revert you within 2-3
hour or immediate
Charges rs
125/subject
If urgent
then call us on 08791490301
No comments:
Post a Comment