You are on page 1of 6

Revision 125

2011 Coventry University

207SE /5

MAY 2010 Coventry University Faculty of Engineering & Computing

207SE Operating Systems and Security


Instructions to candidates Time allowed: 3 hours 0 minutes

This is a Closed Book Examination Answer: Any 4 Questions

The total number of questions in this paper: 5 All questions carry equal marks Start each question on a new page and carefully identify your answers with the correct question number For this examination you will be supplied with the following: 1 Answer Book/s

You must hand this question paper in at the end of the examination Please keep in a safe place for future reference
207SE-MAY10-QUES.DOC 1 of 6 Saved 31/03/2010

Revision 125

2011 Coventry University

207SE /5

Each question is worth {25} marks

1.

a.

Describe the two general roles of an operating system and elaborate why these roles are important. (6 marks)

b.

Draw a Process State Transition Diagram to explain how a processs states change in a Multi-Programming System. (9 marks)

c.

Describe briefly, what the Kernel of an Operating System is. (4 marks)

d.

State the differences between the Kernel Mode and the User Mode in an Operating System environment. (6 marks)

Continued

207SE-MAY10-QUES.DOC

2 of 6

Saved 31/03/2010

Revision 125

2011 Coventry University

207SE /5

Each question is worth {25} marks

2.

a)

A file system supports permissions such as execute on an individual file. List five other permissions that can be applied to a file. (5 marks)

b)

An NTFS file system drive has been heavily used and it is expected that a defragment operation will allow an increase of 5% in the reported empty space.

Discuss in your own words what defragmentation is and how it helps in effectively managing disk space. (6 marks)

c)

A file system is required for an organization with 1500 users. Out of 1500, 1490 belongs to same category of users and want to access one file.

Discuss how permissions can be setup on the file.

(4 marks)

d)

A file is required to be copied using a C/C++ program. Provide pseudocode listings for the operation

highlighting all important steps. Assume you can open the file without any error. (10 marks)

Continued

207SE-MAY10-QUES.DOC

3 of 6

Saved 31/03/2010

Revision 125

2011 Coventry University

207SE /5

Each question is worth {25} marks

3.

a)

State the differences between processes and threads in the context of computer operating systems. (6 marks)

b)

A process makes a request to print documents to a printer. It just so happens that at the same instant another process makes a similar request.

How do you ensure that the two processes do not interfere with each others? (6 marks)

c)

Deadlock is a serious problem that can occur in concurrent systems. How do you, as an OS designer and developer, control deadlock? In your answer, briefly explain the four conditions for deadlock to occur. (8 marks)

d)

List five reasons for process termination.

(5 marks)

Continued

207SE-MAY10-QUES.DOC

4 of 6

Saved 31/03/2010

Revision 125

2011 Coventry University

207SE /5

Each question is worth {25} marks

4.

a)

Define the term virtual memory and explain the basic concepts behind its operation. (6 marks)

b)

Describe in detail the mechanism by which a virtual address is translated to a physical memory address. A diagram will help to illustrate this. (8 marks)

c)

In a particular computer system the real (physical) address is 32 bits and the virtual address is split as 10 bits offset, 2 bits byte addressability, 20 bits being left for identifying the page. What size are the Pages and the Page Table? Comment on the design choice. (6 marks)

d)

Describe the use that is made by the OS of the writtento bit sometimes known as the dirty bit. Where is it and what effect does it have on the performance of the system? (5 marks)

Continued

207SE-MAY10-QUES.DOC

5 of 6

Saved 31/03/2010

Revision 125

2011 Coventry University

207SE /5

Each question is worth {25} marks

5.

a)

Justify why security is an important aspect of operating systems. State the difference between security policy and security mechanisms in the context of an operating system. (8 marks)

b)

A protection domain is a set of access rights defined as a set of objects and the operations permissible on them. The diagram below shows the protection domain scenario for objects: F1, F2, F3, F4, and P1. User process executing in domain D1, D2, D3 or D4 has access rights specified by each domain.

Produce an access matrix specifying the authorisation policy for the scenario below. (5 marks for the structure) (6 marks for the matrix)
D1 F1(read) F3(read) D2 F2(write) F4(read) P1(print) D4 F1(read,write) F3(read,write) D3 F2(read) F3(execute)

(11 marks)

c)

How do operating systems store passwords?

(6 marks)

End

207SE-MAY10-QUES.DOC

6 of 6

Saved 31/03/2010

You might also like