Click to follow our Afritutor YouTube Channel, subscribe and click notifications and get updates on new learning videos


<=Back

<=KNEC Diploma in ICT module I Operating systems past paper: July 2012

List four files access method in operating systems

    Viewed:  414  times
For Better experience and learning,for video answers, after video ends playing, click next question in the questions list!!!

  Share in:
        

Question Answer:





Questions List:

1. State four objectives of operating system
2. Explain the meaning of the following terms as used in operating system I.Kernel II.Shell;
3. Differentiate between monolithic and non-monolithic operating systems
4. Ann, a system analyst with a certain company created a system file using an operating system. Explain two file properties she could have used
5. State four file organizations used in operating systems
6. Outline four typical operations that could be performed on files in a computer system
7. Outline two file attributes used in operating systems
8. Explain each of the following terms as used in operating system i)Disk caching ii)Volume
9. Differentiate between low-level and high-level formatting as used in disk operation
10. During data input using a keyboard, the operating system temporarily stores the keyboard strokes on the keyboard memory. i)Identify this I/O communication technique. ii)State one advantage of the technique identified in (i). iii)Explain two purpose of using this I/O technique in (i)
11. State four types of disk arm scheduling algorithms
12. During an operating system lesson in a certain college, a lecturer mentioned various kernel components that facilitates the I/O manager. Outline four kernel components that could have mentioned
13. The figure 1 shows a memory allocation technique used in an operating system. Use it to answer the question that follows. (i)Identify the memory allocation technique used justify your answer. (ii)Explain the procedure that could be used for address transition (iii)Explain four benefits of the memory allocation technique identified in (i)
14. A group of ICT module1 students in a certain college were carrying out an assignment about causes of process termination in operating system. Explain two possible causes they have written in their report
15. Explain each of the following terms as used operating system i)Semaphore ii)Monitor
16. Differentiate between symmetric and asymmetric multiprocessing operating systems
17. Paul, a module 1 student in a certain college was carrying out a term project which involved a developing an interactive operating system. He decided to use preemptive scheduling algorithm. (i) Explain one reasons that could have influenced his choice of this scheduling algorithms ii)Explain two limitations of this scheduling algorithm
18. A certain organization used a distributed operating system. Assuming you are hired as an IT consultant, explain three file access control methods you could recommend to safeguard the organizational data
19. Outline two strategies that could be used to prevent deadlock in computer systems.
20. Explain the term virtual memory as used in operating systems
21. Explain three objectives of memory management as used in operating system.
22. Differentiate between virtual memory and physical memory addressing as used in operating systems
23. List four files access method in operating systems
24. Outline three characteristics of the 4th generation operating systems
25. Differentiate between block oriented and character oriented I/O device giving an example in each case
26. With the aid of a diagram, describe the process life cycle as used in operating systems
27. With the aid of a diagram, describe the memory hierarchy in computer systems
28. State four examples of network operating system from other different families
29. State two advantages of distributed operating system
30. Table 1 shows details of process in a computer system. Use it to answer the questions that follows.Assuming that the system uses SJF scheduling algorithm Explain one disadvantage of the system
31. A certain software company developed an operating system but during testing, the results showed the system has a problem with memory segmentation. Outline four causes of the problem
32. James, a student with a certain college was carrying out an assignment about memory registers in computer system. Describe two types of registers James would include in his report
33. Explain two advantages of dynamic linking as used in memory management
34. A certain company intends to deploy RAID technology as a backup strategy on their distributed system. Outline four level of RAID technology the company would use to accomplish the task
35. Alex, a system analyst with a certain company was given a task of designing an operating system that would work with different hardware vendor. Describe three types of I/O communication technique that he would use
36. With aid of DIAGRAM, Outline the internal structure of a hard disk


About Us

Contact us

Terms of use | Privacy policy

Follow Us:               

All Rights Reserved © 2024; pscustudies.com