How To Exam?

a knowledge trading engine...


Dharmsinh Desai University 2007-3rd Sem M.C.A Computer Aplications Introduction to System Programming - Question Paper

Sunday, 20 January 2013 03:45Web


Sub : Introduction to System Programming.
Sem : 3
Uni : DDU


35.


Dharmsinh Desai University, Nadiad MCA - III [Introduction to Systems Programming]

External Examination

Max. Marks 60

Time: 3 hours Q\o:00 To \\ oQ

SECTION -1

[10]


Q1 Answer the following questions:

(i) Mainframes were introduced in_generation while multiprogramming was introduced in

generation.

(ii) _memory is at top of memory hierarchy while_is at bottom.

(Hi) A page must be written to disk if it is to be removed from memory and_bit is to set to

(,v) ' *s background process which ensures that there is enough supply of empty page

frames to maintain paging systems.

(v)    The file access can be either__ or_.

(vi)    Unsafe state is not a deadlocked state. (T/F) Justify your answer.

(vii)    The time required to complete number of jobs per unit time is called as

(a) Turnaround time (b)Throughput (c) Waiting time    (d) None of the given

(viii)    The system call in UNIX to delete a file is

(a)deiete() (b) remove() (c)exit() (d) None of the given

(ix)    The disk having alternate numbering of sectors is called as

C: (a) Interleaving (b) Double interleaving (c) Single interleaving (d) None of the given

(x)    For the command cat f1 .txt | grep hello, grep will be in which state until cat is not executed?

(a) Running ' (b) Ready (c) Blocked (d) None of the given

Q2

[4]

[4]

[2]


(A)    Explain in brief different types of operating system.

(B)    Give the solution to producer consumer problem using semaphore.

(C)    Distinguish between preemptable and non preemptable resources.

OR

v


Q2    *

[4]

[4]


(A)    What is process? Explain with example conditions for process termination

(B)    Write an algorithm for deadlock detection with one resource of each type.

(C) Distinguish between preemptive and non preemptive scheduling algorithm.    [2]

Q3

(A) Memory is divided with allocation unit size of 4KB and is allocated in the following sequence of [4] processes and holes:

Process A of size 9KB, hole of size 12KB, B of size 2KB, C of 8KB, hole of 12KB and D of 10KB Draw the figure showing this memory allocation. Also represent it using bitmap and linked list.

[4]

[2J*


(B)    Explain the importance of selecting optimum page size.

(C)    Explain in brief linked list allocation of file implementation.

OR

Q3

(A)    A machine has 4 page frames and page frames are referenced in the following order: 1 0 2 3 2 2 3.    [4] Which is the least recently used page frame? Show using matrix implementation of LRU algorithm.

g

14]


(B)    Explain with figure fife system layout.

(C)    What do you mean by segmentation?

\

SECTION - It

Q4 Select appropriate option from the multiple choices given below:

[10]


(i)    In DMA_and_modes are used for transferring data.

(ii)    The assembly statement which indicates actions to be performed is called as_while

which directs to the assembler is called as_.

(iii)    The non terminal on LHS of the first production rule is called as

(iv)    _: phase of compiler divides program into tokens while_phase validates meaning

of the statement.

(v)    In variant I of intermediate code, the second operand of statement is represented by pair_.

(vi)    Which statement is used to assign values to sequencing symbol?

(a) LCL    (b) SET    (c) GBL    (d) None of the given

(vii)    In public key cryptography, encryption of text is done using which key?

(a) Plain    (b) Public (c) Private (d) None of the given

(viii)    If the translation time origin is 300 and translation time address of symbol A is 321. If the link

origin is 285 then what will be the link time address of A?

(a) 306    (b) 385    (c) 336    (d) None of the given

(ix)    The type of I/O in which control registers are stored in separate area is called as (a) Programmed    (b) Memory mapped    (c) I/O mapped (d) None of the given

(x)    Protecting data from being updated by unauthorized users are called as (a) Data integrity    (b) Data confidentiality (c) Privacy (d) None of the given

Q5

[5]


(A)    Write a note on memory mapped I/O.

(B)    Sfcnerate SYMTAB, LITTAB and POOLTAB for the following program unit. Also convert the given [5] program in machine language.

START 300 MOVER BREG, A ADD BREG, B LOOP ADD BREG, ='2*

MOVEMBREG, A CMP BREG, ='1 O

BC LT, NEXT LTORG

SUB BREG, -3

STOP    *

A DS 1 BDS1

NEXT EQU LOOP END

t

OR

Q5

(A) The disk consists of 60 cylinders and initially arm is at cylinder number 15. Then the request arrives in [4] the order 16, 10, 12, 45, 18, 57 and 32. Calculate total number of cylinder movement using FCFS and Elevator (initially upward direction) algorithms

(B)    Explain in brief ORIGIN and LTORG statements.

[4]

[2]


t

(C)    What do you mean by interrupt driven I/O?

Q6

[4]

[4]

[2]


(A)    Explain in brief digital signatures.

(B)    What is object module? Write an algorithm for program relocation.

(C)    Define following terms:

(i) Forward reference, (ii) Location counter

OR

r

Q6

(A) What is macro preprocessor? Write a macro CALC for performing calculation A-B+C. Give the default [4] register as BREG.

(B)    Define grammar. Explain in brief classification of grammar.

[4]

[2]


(C)    What is an ENTRY and EXTRN statement?

h.







Attachment:

( 0 Votes )

Add comment


Security code
Refresh

Earning:   Approval pending.
You are here: PAPER Dharmsinh Desai University 2007-3rd Sem M.C.A Computer Aplications Introduction to System Programming - Question Paper