1.

Describe three characteristics of a monolithic operating system.

2.

Explain the concept of virtualization in operating systems and its benefits.

3.

Explain the objectives/goals of a real-time operating system (RTOS).

4.

Discuss the primary functions of memory management in operating systems.

5.

Compare and contrast batch processing and time-sharing operating systems.

6.

Outline the key features of a client-server model operating system.

7.

Illustrate the process management function in operating systems with suitable examples.

8.

Examine the role of device management in ensuring efficient operation of hardware in operating systems.

9.

Evaluate the importance of security and access control mechanisms in modern operating systems.

10.

Describe the layers involved in a layered operating system structure and their interactions.

11.

Discuss the evolution of operating systems from batch processing to real-time systems, highlighting key milestones.

12.

Examine the functions of a shell in the context of operating systems, providing examples of popular shell environments.

13.

Explain how a virtual machine (microkernel) operating system structure differs from a monolithic operating system structure.

14.

Evaluate the advantages and disadvantages of using a distributed operating system compared to a traditional centralized operating system.

15.

Describe the main characteristics of mobile operating systems and how they differ from desktop operating systems.

16.

Analyze the implications of using demand paging versus prepaging strategies.

17.

Outline the criteria used in the placement policy of memory allocation.

18.

Explain the conditions necessary for deadlock to occur in a system.

19.

Evaluate the effectiveness of first-fit, best-fit, and worst-fit algorithms in memory allocation.

20.

Outline the steps involved in detecting deadlock using resource allocation graphs.

21.

Illustrate the operation of least recently used (LRU) and first-in-first-out (FIFO) policies in page replacement.

22.

Discuss the advantages and disadvantages of using write-through versus write-back strategies in memory cleaning.

23.

Explain the concept of internal fragmentation and its impact on memory utilization.

24.

Discuss the role of mutual exclusion in contributing to deadlock situations in concurrent programming.

25.

Compare and contrast virtual memory and physical memory, highlighting their roles in memory management.

26.

Discuss the advantages and disadvantages of using write-through versus write-back strategies in memory cleaning.

27.

What is the primary purpose of memory management in computer systems?
A. Optimize CPU performance
B. Efficiently use available memory resources
C. Enhance network connectivity
D. Improve display resolution

28.

Which memory management technique involves dividing memory into fixed-size partitions at system boot?
A. Dynamic partitioning
B. Paging
C. Fixed partitioning
D. Segmentation

29.

What problem does thrashing in virtual memory systems cause?
A. Excessive disk I/O
B. Fragmentation of memory
C. Overheating of CPU
D. Network congestion

30.

Which page replacement policy evicts the least recently used page from memory?
A. FIFO
B. LRU
C. Clock
D. Random

31.

What is the primary advantage of using segmentation over paging in memory management?
A. Simplified address translation
B. Reduced fragmentation
C. Efficient use of physical memory
D. Improved disk I/O performance

32.

Which memory management policy determines where to load a new program in memory?
A. Fetch
B. Replacement
C. Placement
D. Cleaning

33.

What is the purpose of the write-back strategy in memory cleaning?
A. Immediately update changes to disk
B. Delay updating changes to disk
C. Avoid paging operations
D. Minimize fragmentation

34.

Which algorithm allocates memory to the first available block that is large enough?
A. Best fit
B. Worst fit
C. First fit
D. LRU

35.

What problem does internal fragmentation cause in memory allocation?
A. Wasted memory space within allocated blocks
B. Uncontrolled paging activity
C. Data corruption
D. Thrashing

36.

Which memory management technique allows programs to execute as if they have more memory than physically available?
A. Paging
B. Segmentation
C. Overlays
D. Thrashing

37.

What role does the cleaning policy play in memory management?
A. Allocates memory to processes
B. Writes modified pages back to disk
C. Determines which pages to evict from memory
D. Determines where to load new programs

38.

Which policy ensures pages are loaded into memory only when they are referenced?
A. Demand paging
B. Prepaging
C. Swapping
D. Segmentation

39.

Which replacement policy evicts the oldest page from memory?
A. LRU
B. FIFO
C. Clock
D. Random

40.

What does the placement policy determine in memory management?
A. Which pages to evict from memory
B. Where to load a new program in memory
C. When to clean memory pages
D. How to allocate memory to processes

41.

Which technique divides memory into variable-size segments for different purposes like code, data, and stack?
A. Paging
B. Segmentation
C. Overlays
D. Fixed partitioning

42.

Compare and contrast paging and segmentation as memory management techniques.

43.

Evaluate the strategies for recovering from deadlock situations in operating systems.

44.

What is the primary goal of process scheduling in operating systems?
A. Minimizing CPU utilization
B. Maximizing context switching
C. Minimizing response time
D. Maximizing wait time

45.

Which scheduler is responsible for selecting processes from the pool of new processes?
A. Long-term scheduler
B. Short-term scheduler
C. Medium-term scheduler
D. Job scheduler

46.

Which scheduling algorithm is non-preemptive in nature?
A. Round Robin
B. Shortest Job First (SJF)
C. Priority Scheduling
D. Shortest Remaining Time First (SRTF)

47.

What condition is necessary for deadlock to occur in a system?
A. Mutual Exclusion
B. Hold and Wait
C. Context Switching
D. Round Robin

48.

Which algorithm detects deadlock using a resource allocation graph?
A. Banker's algorithm
B. Timeout-based detection
C. State detection algorithm
D. Round Robin algorithm

49.

What is the purpose of a semaphore in concurrent programming?
A. Prevent deadlock
B. Ensure mutual exclusion
C. Manage memory allocation
D. Manage process priority

50.

Which IPC mechanism involves processes communicating through a centralized message queue?
A. Shared Memory
B. Direct Messaging
C. Indirect Messaging
D. Semaphore

51.

What is a key advantage of using monitors over semaphores in managing shared resources?
A. Higher performance
B. Simplicity of implementation
C. Greater flexibility
D. Better memory management

52.

Which concurrency control mechanism ensures that transactions do not interfere with each other?
A. Locking
B. Rollback
C. Timeout
D. Recovery

53.

What is the primary challenge in implementing shared memory for inter-process communication?
A. Resource allocation
B. Process synchronization
C. Data corruption
D. Deadlock prevention

54.

Which graph-based technique is used for deadlock detection in operating systems?
A. Stack allocation graph
B. Resource allocation graph
C. Task allocation graph
D. Dependency allocation graph

55.

How does priority scheduling determine which process to execute next?
A. Based on the longest job
B. Based on the shortest job
C. Based on the highest priority
D. Based on the lowest priority

56.

What role does isolation play in concurrency control in database systems?
A. Ensuring mutual exclusion
B. Preventing data corruption
C. Managing process priority
D. Handling process states

57.

Which scheduling algorithm allocates a small unit of CPU time to each process in a circular manner?
A. Shortest Job First (SJF)
B. Round Robin
C. Priority Scheduling
D. Shortest Remaining Time First (SRTF)

58.

What is the primary goal of using multi-version concurrency control (MVCC) in database systems?
A. Maximizing CPU utilization
B. Reducing response time
C. Ensuring data consistency
D. Preventing deadlock

59.

Explain the concept of thrashing in virtual memory systems.

60.

Describe the role of each component in the fetch policy of memory management.

61.

Which of the following best describes a monolithic operating system?

62.

What is the primary objective of a real-time operating system (RTOS)?

63.

Define the concept of process scheduling and discuss its importance in operating systems.

64.

Define the term 'input device' and provide two examples.

65.

Compare and contrast SCAN and C-SCAN disk arm scheduling algorithms.

66.

Explain the features of scheduling algorithms and how they impact system performance.

67.

Which function is NOT typically managed by an operating system's memory management?

68.

Time-sharing operating systems are primarily designed for:

69.

In a client-server model operating system, which component typically provides file and print services?

70.

Which directive verb best fits the function of process management in operating systems?

71.

Compare and contrast the benefits of using Shortest Job First (SJF) and Shortest Remaining Time First (SRTF) scheduling algorithms.

72.

The role of device management in operating systems includes:

73.

Security mechanisms in operating systems primarily aim to:

74.

Which statement best describes the concept of virtualization in operating systems?

75.

A layered operating system structure offers advantages in:

76.

Compare and contrast long-term, short-term, and medium-term schedulers in operating systems.

77.

Describe the characteristics of non-preemptive scheduling algorithms and provide a relevant example.

78.

Analyze the advantages and disadvantages of preemptive scheduling algorithms in real-time systems.

79.

Discuss the principles of priority scheduling and its implementation in managing CPU resources.

80.

Evaluate the effectiveness of round-robin scheduling in balancing CPU utilization and response time.

81.

Discuss the characteristics and applications of different RAID levels.

82.

Define a semaphore and explain how it is used for synchronization in concurrent programming.

83.

Describe the concept of monitors and discuss their advantages over semaphores in managing shared resources.

84.

Explain the process of message passing and its role in inter-process communication.

85.

Define memory management and explain its significance in computer systems.

86.

Differentiate between fixed partitioning and dynamic partitioning in memory management.

87.

Discuss the advantages and disadvantages of using overlays in memory management.

88.

Evaluate the necessity of memory protection mechanisms in operating systems.

89.

Analyze the challenges associated with memory management in embedded systems

90.

Explain the principles of input and output software with suitable examples.

91.

Describe the structure of a disk and explain its primary operations.

92.

Compare and contrast FIFO and SSTF disk arm scheduling algorithms

93.

Discuss the concept of spooling in computing

94.

Explain the role of device drivers in managing input and output devices.

95.

Illustrate the function of a real-time clock in a computer system.

96.

Describe the components and functions of RAID in data storage.

97.

Discuss the objectives of virtual devices in computer systems

98.

Explain how caching improves system performance with examples.

99.

Define RAM disk and discuss its advantages over traditional storage devices.

100.

Describe the structure and functions of a computer terminal.

101.

Explain the purpose of buffering in data processing.