Download CUSTOMER_CODE SMUDE DIVISION_CODE SMUDE

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Acorn MOS wikipedia , lookup

CP/M wikipedia , lookup

Unix security wikipedia , lookup

Spring (operating system) wikipedia , lookup

Security-focused operating system wikipedia , lookup

Burroughs MCP wikipedia , lookup

DNIX wikipedia , lookup

Distributed operating system wikipedia , lookup

Process management (computing) wikipedia , lookup

Transcript
CUSTOMER_CODE
SMUDE
DIVISION_CODE
SMUDE
EVENT_CODE
APR2016
ASSESSMENT_CODE MIT201_APR2016
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
16029
QUESTION_TEXT
a.What are category’s of major security threats and types of viruses.
b.Explain basic types of MOS
SCHEME OF
EVALUATION
Major threats to security are categorized as:
Tapping
Disclosure
Amendment
Fabrication
Denial
(2 marks)
Types of viruses:
Boot sector infectors
Memory Infectors
File specific Infectors
Command processor Infectors
General purpose infectors
(2 marks)
Basic types of Multiprocessor Operating Systems(MOS) are:
Separate supervisors
Master/slave
Symmetric
Separate supervisors: Here each node is a processor having a separate
operating system with memory and I/O resources. Addition of few
additional services and data structures will help to support aspects of
multiprocessor
(2 marks)
Master/slave: In this approach, one processor the master is dedicated to
execute the operating system, the remaining processors are slaves and
form a pool of computational processors. The master schedules and
controls the slaves. This arrangement allows parallelism in an
application by allocating to it many slaves.
(2 marks)
Symmetric: All processors are functionally identical. They form a pool
of resources. Other resources such as memory and I/O devices are
available to all processors. If they are available only to a few then system
becomes asymmetric. The operating system is also symmetric. Any
processor can execute it. The processor which executes the operating
system temporarily is the master
(2 marks)
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
16030
QUESTION_TEXT
Write a note on Module Kernel
SCHEME OF
EVALUATION
The best current methodology for operating system design involves
using object-oriented programming techniques to create a modular
kernel. The kernel has a set of core components and dynamically links
in additional services either during boot time or during run time. Such
strategy uses dynamically loadable modules and is common in modern
implementations of UNIX such as Solaris, LINUX and MacOS. For
example the Solaris OS structure is organized around a core kernel with
seven types of loadable kernel modules
(Scheme: 5 marks)
1.Scheduling
2.File Systems
3.Loadable System calls
4.Executable formats
5.STREAMS formats
6.Miscellaneous
7.Device and bus drivers
Such a design allow the kernel to provide core service yet also allows
certain features to be implemented dynamically.
(Scheme: 5 marks)
(Scheme: As above 5 + 5 = 10 marks)
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
74195
QUESTION_TEXT
A security system can be attacked in many ways. Discuss some
of them
SCHEME OF
EVALUATION
A security system can be attacked in many ways. Some of them
are
1. Authentication: Explain
(Scheme: 3 marks)
2. Browsing
3. Invalid parameters
4. Line tapping
5. Improper Access controls
(Scheme: 2 to 5 1 mark each = 4 marks)
6. Rogue software: Explain
(Scheme: 3 marks)
(Scheme: As above 3+4+3 = 10 marks)
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
74200
QUESTION_TEXT
Give and explain I/O structure.
SCHEME OF
EVALUATION
The I/O controllers and main memory are connected to the main system
bus. The cache memory (usually found on-chip with the CPU) has a
direct connection to the processor, as well as to the system bus.
The I/O devices shown here are not connected directly to the system bus;
they interface with another device called an I/O controller. In simpler
systems, the CPU may also serve as the I/O controller, but in systems
where throughput and performance are important, I/O operations are
generally handled outside the processor.
Until relatively recently, the I/O performance of a system was somewhat
of an afterthought for systems designers. The reduced cost of highperformance disks, permitting the proliferation of virtual memory
systems, and the dramatic reduction in the cost of high-quality video
display devices, have meant that designers must pay much more
attention to this aspect to ensure adequate performance in the overall
system.
Because of the different speeds and data requirements of I/O devices,
different I/O strategies may be useful, depending on the type of I/O
device which is connected to the computer. Because the I/O devices are
not synchronized with the CPU, some information must be exchanged
between the CPU and the device to ensure that the data is received
reliably. This interaction between the CPU and an I/O device is usually
referred to as “handshaking''.
(10 marks)
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
118250
QUESTION_TEXT
Explain Direct and Indirect Communication. How the send and receive
primitives are defined and what are the properties of communication link
in Direct and Indirect Communication.
Direct Communication:
SCHEME OF
EVALUATION
In the direct–communication discipline, each process that wants to
communicate must explicitly name the recipient or sender of the
communication. In this scheme, the send and receive primitives are
defined as follows:
Send (P, message). Send a message to process P.
Receive (Q, message). Receive a message from process Q.
A communication link in this scheme has the following properties:
A link is established automatically between every pair of processes that
want to communicate. The processes need to know only each other's
identity to communicate.
A link is associated with exactly two processes.
Between each pair of processes, there exists exactly one link.
The link may be unidirectional, but is usually bi–directional. (5 Marks)
Indirect Communication:
With indirect communication, the messages are sent to and received
from mailboxes (also referred to as ports). A mailbox can be viewed
abstractly as an object into which messages can be placed by processes
and from which messages can be removed. Each mailbox has a unique
identification. In this scheme, a process can communicate with some
other process via a number of different mailboxes. Two processes can
communicate only if the processes have a shared mailbox. The send and
receive primitives are defined as follows:
send (A, message). Send a message to mailbox A.
receive (A, message). Receive a message from mailbox A.
In this scheme, a communication link has the following properties:
A link is established between a pair of processes only if they have a
shared mailbox.
A link may be associated with more than two processes.
Between each pair of communicating processes, there may be a number
of different links, each link corresponding to one mailbox.
A link may be either unidirectional or bi–directional. (5 Marks)
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
118254
QUESTION_TEXT
What is centralized data? Explain the functions of NOS?
Definition of centralized data (2 Marks)
Functions of NOS
i.
Redirection
ii.
Communication management
iii.
File/printer services
iv.
Network management (8 Marks)
SCHEME OF EVALUATION