Click to follow our Afritutor YouTube Channel, subscribe and click notifications and get updates on new learning videos


<=Back

<=KNEC Diploma in ICT module I Operating systems past paper: July 2023

Outline three factors that determines the efficiency of an I/O device

    Viewed:  56  times
For Better experience and learning,for video answers, after video ends playing, click next question in the questions list!!!

  Share in:
        

Question Answer:





Questions List:

1. Outline four characteristics of a priority scheduling algorithm
2. Distinguish between dumb and smart controllers
3. Outline two rules that should be followed when implementing a layered operating system
4. Mary noted several caching issues while using an operating system. Explain two such issues that she could have noted
5. Distinguish between seek time and latency as applied is disk drives
6. Contiguous file allocation method is commonly used in operating systems. Outline four advantages of this file allocation method.
7. Audit trail is an important file protection feature in operating systems. Outline four typical content of the audit records captured by this feature
8. Distributed Operating System allows applications running on multiple computers to be linked via a communications link. Describe two types of this operating system
9. A lecturer described the computer clocking system during an operating system lesson. Describe two types of clocks that he could have mentioned
10. Outline four characteristics of round robin scheduling algorithm
11. Differentiate between maskable and non-maskable interrupts
12. Explain the term process swapping used in process management
13. Computer terminals are commonly used for input of data in organizations. Describe two types that are likely to be used
14. John was required to mention several disadvantages of memory overlay during a job interview. Explain three disadvantages that he could have mentioned
15. Distinguish between address and address space as applied in memory management
16. Explain two types of semaphores used in process management
17. Explain two circumstances under which an organization would implement a tree- structured directory
18. A kernel is key in operating systems. Outline four roles it plays in operating system
19. Virtual memory does affect the performance of a system. Explain three disadvantages of implementing virtual memory in highly computational environments
20. Explain each of the following terms as used in operating systems: (i) system call; (ii) hypervisor
21. The operating system maintains separate types of process scheduling queues throughout the process life cycle. Explain two of these process scheduling queues.
22. Outline three factors that determines the efficiency of an I/O device
23. Ruben intends to implement a disk scheduling algorithm in an operating system that he was designing for a client. Describe two reasons for the inclusion of the algorithm
24. Explain each of the following terms used in computer memory: (i) dual channel; (ii) Error Correcting Code
25. Distinguish between ready and ready suspended process states
26. RAM disks are commonly used by computer users to temporarily store data. Explain three features that are likely to be exhibited when using it.
27. Explain three design flaws common in I/O throughput
28. Zack was researching on types of I/O device that could be used in organizations. Explain two types that he could have established
29. File naming requires careful consideration by the users. Outline five guidelines that should be followed.
30. Andy was required to diagnose the reasons for process termination in an operating system. Outline five reasons that he could find.
31. List four examples of file extensions used in computers
32. Outline four ways of securing files stored in a computer
33. Modern operating system uses inverted page tables for memory management. Explain two disadvantages that could be realized from this method of paging
34. List four system file formats used in operating system
35. Figure 1 shows a memory management technique. Use it to answer the questions that follow. Operating System
36. Figure 2 shows a contiguous memory allocation technique. Use it to answer the questions that follow. (i)Outline the memory technique shown in Figure 2. (ii) Explain two advantages of the memory technique identified in (i).
37. Figure 3 shows memory hierarchy in a computer. Use it to answer the question that follows. Describe the two memory hierarchy levels labelled (i) and (ii)


About Us

Contact us

Terms of use | Privacy policy

Follow Us:               

All Rights Reserved © 2024; pscustudies.com