3
LOYOLA COLLEGE (AUTONOMOUS), CHENNAI – 600 034 M.C.A. DEGREE EXAMINATION - COMPUTER APP. SECOND SEMESTER – APRIL 2012 CA 2802 - OPERATING SYSTEM AND SYSTEM SOFTWARE Date : 19-04-2012 Dept. No. Max. : 100 Marks Time : 9:00 - 12:00 PART A Answer all questions: 10 x 2 = 20 1. What is the role of system software in machine programming? 2. What is the use of semaphore in deadlock prevention ? 3. What is fragmentation? 4. What is the role of base address and relative address in memory addressing methods? 5. State user access privilege of a file. 6. What is the use of file encryption? 7. What is the use of assembler directives? 8. Why assembler generates intermediate code in two-pass assembler? 9. What is the use of interpreter? 10. While executing .EXE file source code is required- Justify PART B Answer all questions: 5 x 8 = 40 11. a. Explain the advantages and disadvantages of preemptive scheduling algorithm OR b. Explain the four conditions for dead lock Occurrence?

Loyola College, Chennai - CA 2802 - OPERATING …€¦ · Web viewLOYOLA COLLEGE (AUTONOMOUS), CHENNAI – 600 034 M.C.A. DEGREE EXAMINATION - COMPUTER APP. SECOND SEMESTER – APRIL

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Loyola College, Chennai - CA 2802 - OPERATING …€¦ · Web viewLOYOLA COLLEGE (AUTONOMOUS), CHENNAI – 600 034 M.C.A. DEGREE EXAMINATION - COMPUTER APP. SECOND SEMESTER – APRIL

LOYOLA COLLEGE (AUTONOMOUS), CHENNAI – 600 034 M.C.A. DEGREE EXAMINATION - COMPUTER APP.

SECOND SEMESTER – APRIL 2012

CA 2802 - OPERATING SYSTEM AND SYSTEM SOFTWARE

Date : 19-04-2012 Dept. No. Max. : 100 Marks Time : 9:00 - 12:00

PART A

Answer all questions: 10 x 2 = 20

1. What is the role of system software in machine programming?

2. What is the use of semaphore in deadlock prevention ?

3. What is fragmentation?

4. What is the role of base address and relative address in memory addressing methods?

5. State user access privilege of a file.

6. What is the use of file encryption?

7. What is the use of assembler directives?

8. Why assembler generates intermediate code in two-pass assembler?

9. What is the use of interpreter?

10. While executing .EXE file source code is required- Justify

PART B

Answer all questions: 5 x 8 = 40

11. a. Explain the advantages and disadvantages of preemptive scheduling algorithm

OR

b. Explain the four conditions for dead lock Occurrence?

12. a. Explain the paged Memory Management with suitable Example .

OR

b. Write about Secondary storage management and how its affects the process efficiency.

13. a. Explain the file attributes with suitable examples .

OR

b. Explain the different Access methods of file in the Operating system.

Page 2: Loyola College, Chennai - CA 2802 - OPERATING …€¦ · Web viewLOYOLA COLLEGE (AUTONOMOUS), CHENNAI – 600 034 M.C.A. DEGREE EXAMINATION - COMPUTER APP. SECOND SEMESTER – APRIL

14. a. Explain the elements of Assembly level language.

OR

b. Explain the Limitations of One pass assembler.

15. a. What are the different data type issues faced in the compilation?

OR

b. Why code optimization is required in the complier design?

PART C

Answer any two questions: 2 x 20 = 40

( Q.No.16 is compulsory)

16. How do you select the primitive algorithm to execute 10 set of tasks? Explain with suitable

calculation and justification ( 20 Marks )

17. a. Explain the deadlock prevention and avoidance with suitable algorithm.

b. Explain about virtual memory management.

18. a. Explain the design of two-pass assembler and its components.

b. Explain the memory mapping issues in compiler.

**************