- Explain the normal mode of operation of a process and when it is in a deadlock state with suitable example.
- Briefly explain the characteristics that results in deadlocks
- Describe deadlocks with the help of a resource allocation graph
- Briefly explain the methods for handling deadlocks
- Examine deadlock prevention w.r.t four necessary conditions of a deadlock.
- Explore and explain the two deadlock avoidance algorithms.
- How is a system recovered from deadlock.
- Explain Banker's Algorithm.
- Explain memory allocation model for a process.
- Explain the implementation of non contiguous memory allocation using segmentation.
- Discuss the techniques used to perform fresh memory allocation from a free list.
- Compare contiguous and non contiguous memory allocation technique
- Define : i) Virtual memory ii) Page Fault
- Define : i) Page in operation ii) Page out operation
- Define : i) Memory fragmentation ii) Memory Compaction.
- Define : Page and Page Frames.
- Define : internal and external fragmentation.
- Define : Paging and external fragmentation.
- Define : Logical and physical address
- Explain the concepts involved in demand loading of a page with neat diagram.
- Explain FIFO and LRU page replacement policies.
- Explain demand loading of a page with the help of a figure.
- Discuss the methods used to achieve the memory protection with a suitable example.
- Describe the memory allocation methods for program controlled blocks.
- Explain demand paging preliminaries.
Wednesday, March 25, 2020
Operating Systems - Module 3 - Important Questions - 18CS43
Subscribe to:
Post Comments (Atom)
Database Management systems - Module 2
1 a. Explain the entity integrity and referential integrity constraints. Why is each considered important. Give examples. b. Discuss eq...
-
Module 1 Define IOT. Explain Evolutionary phases of the internet What is IOT? Explain in detail on Genesis of IOT. What does IOT and digi...
-
List the key features of Python Programming Language. What is the role of a programmer?. List at least two skills required to be a best ...
-
1 a. Explain the entity integrity and referential integrity constraints. Why is each considered important. Give examples. b. Discuss eq...
No comments:
Post a Comment