Click to follow our Afritutor YouTube Channel, subscribe and click notifications and get updates on new learning videos


<=Back

<=KNEC Diploma in ICT module I Operating systems past paper: November 2015

Anna was required to investigate I/O protection measures that could be implemented in an operating system for her company. Explain two measures that could have identified

    Viewed:  519  times
For Better experience and learning,for video answers, after video ends playing, click next question in the questions list!!!

  Share in:
        

Question Answer:





Questions List:

1. Explain the term page table as applied in operating systems
2. Outline four advantages of First Come First Served (FCFS) scheduling algorithms.
3. Paul was investigating the challenges that his company might be experiencing as a result of using monolithic operating system. Explain two challenges he could have identified.
4. Explain two circumstances that could necessitate implantation of a client server operating system in an organization
5. Sam was required to investigate disadvantages of virtual machines in computers. Explain three disadvantages that he could have established.
6. Outline two file allocation methods that could be used in operating systems
7. Explain two reasons for adapting buffering technique in I/O communication.
8. Figure 1 shows inbound memory hierarchy diagram. Describe each of the layers labeled A, B and C.
9. Several design issues are of concern in disk cache implementation. Explain two typical considerations that could be observed
10. Beth intends to adopt a full backup scheme for her company’s file system. Explain two disadvantages that she could likely realize while using this back up scheme.
11. Distinguish between human-readable and machine-readable I/O devices.
12. Sarah intends to select a file system for a company. Outline four factors that she should consider other than cost.
13. Define each of the following terms as used in file system (i.)field; (ii.)Record
14. The short term scheduler is invoked whenever an event occurs that may be lead to the blocking of the current process in an operating system. Outline four examples of such events that could be invoked
15. Explain two circumstances under which an operating system would prompt a user to rename a file.
16. Explain each of the following terms as used in operating system: (4mks) (i.)port; (ii.)Message
17. Figure 2 shows a cross section of a disk platter. Outline each of the parts label (i) and (ii).
18. Kate was investigating a condition necessary for deadlocks in operating systems. Outline four conditions that she would likely to identify.
19. Julie intends to use fixed memory portioning in an operating system that she was designing for a client. Explain two difficulties that she could experience while using this memory technique
20. Explain each of the following types of I/O operations: (6mks) (i.)control; (ii.)status; (iii.)Transfer.
21. Explain two circumstances that could render use of context switching in operating systems.
22. Hillary was required to identify disadvantages of sequential file access method during a job interview. Outline five disadvantages that he could have mentioned.
23. With the aid of a diagram, describe a process control block PCB as applied in operating system.
24. Explain each of the following terms as used in memory management; (4mks) (i.)address space; (ii.)User space.
25. Distinguish between a ready-state and blocked-state of a process
26. Amos was required to implement a remote file sharing system for a client. Explain three methods that he could consider for the client
27. Figure 3 shows a memory allocation technique. Use it to answer the questions that follow. (i.)Identify the appropriate memory management techniques depicted in the figure. (ii.)Explain two benefits that could be realized when using memory management technique identified in (i).
28. Outline four typical resources needed in a process execution
29. Differentiate between data and system buses as used in computers
30. Describe the term disk cache as applied in computers
31. Anna was required to investigate I/O protection measures that could be implemented in an operating system for her company. Explain two measures that could have identified
32. A number of memory placement techniques exist in an operating system. Explain three of such techniques that could be adapted in a given operating system.
33. Define the term monitor as used in process management
34. Distinguish between logical and physical addresses as applied in memory management.
35. Tom was required to develop a clock module for an operating system for a client. Outline four functions of this module to the proposed operating system
36. Nabat described several objectives for developing an I/O module to his friends. Outline four objectives that he could have mentioned


About Us

Contact us

Terms of use | Privacy policy

Follow Us:               

All Rights Reserved © 2024; pscustudies.com