BCA2010 – OPERATING SYSTEM

Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :

  “ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601



(FALL 2014) ASSIGNMENT

PROGRAM
BCA (Revised Fall 2012)
SEMESTER
2
SUBJECT CODE & NAME
BCA2010 – OPERATING SYSTEM
CREDIT
2
BK ID
B1405
MAX.MARKS
60

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.


1 Differentiate between Distributed Systems and Real-time Systems.
Answer : A distributed real-time system composes two challenging sets of properties which are imposed by the problem domain or the solution domain (or both.)

Distributed

A distributed system links a number of independent computing entities with local properties by way of a communication mechanism. As a consequence, algorithms and other design components must take into consideration the synchrony and the failure model. A useful summary (not entirely objective) of distributed computing concerns is included in Deutsch's Eight Fallacies of Distributed Computing. (See this useful exposition.) All of these are useful to consider in (real-time) distributed design; each is a departure point for essential design and implementation concerns:

1)      The network is reliable
2)      Latency is zero
3)      Bandwidth is infinite
4)      The network is secure



2 Explain the different process states.

Answer : A process is a program in execution. The execution of a process must progress in a sequential fashion. Definition of process is following.
A process which is Executed by the Process have various States, the State of the Process is also called as the Status of the process, The Status includes whether the Process has Executed or Whether the process is Waiting for Some input and output from the user and whether the Process is Waiting for the CPU to Run the Program after the Completion of the Process.

The various States of the Process are as Followings:-

1) New State : When a user request for a Service from the System , then the System will first initialize the process or the System will call it an initial Process . So Every new Operation which is Requested to the System is known as the New Born Process.

2) Running State : When the Process is Running under the CPU, or When the Program is Executed by the CPU , then this is called as the Running proce



3 Define Deadlock. Explain necessary conditions for deadlock.

Answer : A deadlock is a situation in which two computer programs sharing the same resource are effectively preventing each other from accessing the resource, resulting in both programs ceasing to function. The earliest computer operating systems ran only one program at a time. Eventually some operating systems offered dynamic allocation of resources. Programs could request further allocations of resources after they had begun running. This led to the problem of the deadlock.

 Coffman (1971) identified four (4) conditions that must hold simultaneously for there to be a deadlock.

1. Mutual Exclusion Condition
The resources involved are non-shareable.
Explanation: At least one resource (thread)




4 Differentiate between Sequential access and direct access methods.
Answer : The hypertext and hyperlink exemplify the direct-access paradigm and are a significant improvement over the more traditional, book-based model of sequential access.

(Direct access can also be called random access, because it allows equally easy and fast access to any randomly selected destination. Somewhat like traveling by a Star Trek transporter instead of driving along the freeway and passing the exits one at a time, which is what you get with sequential access.)

In a normal, physical book, the reader is supposed to read pages one by one, in the order in which they are provided by the author. For most



5 Differentiate between Daisy chain bus arbitration and Priority encoded bus arbitration.

Answer : In most mini- and mainframe computer systems, a great deal of input and output occurs between the disk system and the processor. It would be very inefficient to perform these operations directly through the processor; it is much more efficient if such devices, which can transfer data at a very high rate, place the data directly into the memory, or take the data directly from the processor without direct intervention from the processor. I/O performed in this way is usually called direct memory access, or DMA. The controller for a device employing DMA must have the capability of generating address signals for the memory, as well as all of the memory control signals. The processor informs the DMA controller that data is available (or is to be placed into) a block of memory locations starting at a certain address in memory. The controller is also informed of the length of the data block.




6 Differentiate between encryption and decryption. What are the two basic methods for encryption?
Answer : Encryption and decryption are both methods used to ensure the secure passing of messages and other sensitive documents and information.

Encryption basically means to convert the message into code or scrambled form, so that anybody who does not have the 'key' to unscramble the code, cannot view it. This is usually done by using a 'cipher'. A cipher is a type of algorithm used in encryption that uses a certain described method to scramble the data. The cipher can only be 'deciphered' with a 'key'. A key is the actual 'described method' that was used to scramble the data, and hence the key can also unscramble the data.

When the data is unscrambled by the use of a key

Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :

  “ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.