KNEC Diploma in ICT module I Operating systems past paper: November 2015 Answers

The answers required by KNEC are provided and well elaborated.

Course Name:  Information and Communication Technology
Also Done By:
N/A
Course Level:  Diploma
Sub Level:       Module I
Course Unit:   Operating Systems
Exam body:    KNEC

Share with Friends:
        
Go Back



1. Explain the term page table as applied in operating systems ()

2. Outline four advantages of First Come First Served (FCFS) scheduling algorithms. ()

3. Paul was investigating the challenges that his company might be experiencing as a result of using monolithic operating system. Explain two challenges he could have identified. ()

4. Explain two circumstances that could necessitate implantation of a client server operating system in an organization ()

5. Sam was required to investigate disadvantages of virtual machines in computers. Explain three disadvantages that he could have established. ()

6. Outline two file allocation methods that could be used in operating systems ()

7. Explain two reasons for adapting buffering technique in I/O communication. ()

8. Figure 1 shows inbound memory hierarchy diagram. Describe each of the layers labeled A, B and C. ()

9. Several design issues are of concern in disk cache implementation. Explain two typical considerations that could be observed ()

10. Beth intends to adopt a full backup scheme for her company’s file system. Explain two disadvantages that she could likely realize while using this back up scheme. ()

11. Distinguish between human-readable and machine-readable I/O devices. ()

12. Sarah intends to select a file system for a company. Outline four factors that she should consider other than cost. ()

13. Define each of the following terms as used in file system (i.)field; (ii.)Record ()

14. The short term scheduler is invoked whenever an event occurs that may be lead to the blocking of the current process in an operating system. Outline four examples of such events that could be invoked ()

15. Explain two circumstances under which an operating system would prompt a user to rename a file. ()

16. Explain each of the following terms as used in operating system: (4mks) (i.)port; (ii.)Message ()

17. Figure 2 shows a cross section of a disk platter. Outline each of the parts label (i) and (ii). ()

18. Kate was investigating a condition necessary for deadlocks in operating systems. Outline four conditions that she would likely to identify. ()

19. Julie intends to use fixed memory portioning in an operating system that she was designing for a client. Explain two difficulties that she could experience while using this memory technique ()

20. Explain each of the following types of I/O operations: (6mks) (i.)control; (ii.)status; (iii.)Transfer. ()

21. Explain two circumstances that could render use of context switching in operating systems. ()

22. Hillary was required to identify disadvantages of sequential file access method during a job interview. Outline five disadvantages that he could have mentioned. ()

23. With the aid of a diagram, describe a process control block PCB as applied in operating system. ()

24. Explain each of the following terms as used in memory management; (4mks) (i.)address space; (ii.)User space. ()

25. Distinguish between a ready-state and blocked-state of a process ()

26. Amos was required to implement a remote file sharing system for a client. Explain three methods that he could consider for the client ()

27. Figure 3 shows a memory allocation technique. Use it to answer the questions that follow. (i.)Identify the appropriate memory management techniques depicted in the figure. (ii.)Explain two benefits that could be realized when using memory management technique identified in (i). ()

28. Outline four typical resources needed in a process execution ()

29. Differentiate between data and system buses as used in computers ()

30. Describe the term disk cache as applied in computers ()

31. Anna was required to investigate I/O protection measures that could be implemented in an operating system for her company. Explain two measures that could have identified ()

32. A number of memory placement techniques exist in an operating system. Explain three of such techniques that could be adapted in a given operating system. ()

33. Define the term monitor as used in process management ()

34. Distinguish between logical and physical addresses as applied in memory management. ()

35. Tom was required to develop a clock module for an operating system for a client. Outline four functions of this module to the proposed operating system ()

36. Nabat described several objectives for developing an I/O module to his friends. Outline four objectives that he could have mentioned ()