KNEC Craft Certificate in ICT module 1 Operating Systems past paper: November 2016 Answers

Answers for CICT OS November 2016

Course Name:  Information and Communication Technology
Also Done By:
NA
Course Level:  Craft Certificate
Sub Level:       Module I
Course Unit:   Operating Systems
Exam body:    KNEC

Share with Friends:
        
Go Back



1. Joy acquired an operating system which she attempted to install in her desktop computer and had the following options displayed. (a) Repair; (b) Upgrade. Explain a circumstance that would necessitate her to apply each of the options. ()

2. Explain the function of each the following terms as used in memory management: (a) Job control language; (b) Command language ()

3. Define each of the following terms as used in memory management: (a) Overlay; (b) Thrashing ()

4. Explain two benefits of virtual memory in a computer system ()

5. Paul bought a laptop computer that he intends to share with his family member. outline four possible measures he could put in place to ensure his data is safe ()

6. 6. John created the following files and named them as follows: (a) June/1.doc (b) port@d.rtf; (c) Accounts=3.xls; (d) June>po.acc. State which of the following file names would be valid. ()

7. Distinguish between pessimistic and optimistic looking as used in concurrent processing by an operating system ()

8. Describe each of the following storage placement policies: (a) Best fit (b) First fit ()

9. Distinguish between preemptive and non-preemptive scheduling algorithms as used in process management. ()

10. Define each of the following terms as used in inter-process communication: (a) Signal; (b) Pipe. ()

11. Explain the term device independence as applied in I/O device management. ()

12. Distinguish between relative and absolute paths as applied in file management ()

13. With the aid of a diagram describe the layered structure of an operating system ()

14. Angela created a file and stored it in a secondary storage medium. Explain two possible attributes she could assign to the file. ()

15. State one disadvantage of each of the following process scheduling methods: (i) First come first served; (ii) Short job first (iii) Round robin ()

16. Rebecca intends to compile a report on the technique that the operating system uses to improve the performance of a disk. Explain three techniques she could include in the report. ()

17. Karmas prefers to purchase an operating system with an NT file system over the one with FAT 32 system. Explain two reasons for his preference ()

18. Explain the function of each of the following as used in memory management: (i) Address translation; (ii) Associative mapping (iii) Page table. ()

19. With aid of a diagram, describe fixed memory partitioning technique ()

20. With the aid of a diagram, describe the process control block as used in inter-process communication ()

21. Outline three conditions of a deadlock in a system ()

22. Explain each of the following terms as used in device I/O management: (i) Device driver; (ii) Device controller. ()

23. Mr. Ketch intends to purchase a random access memory (RAM) from IT vendor. Explain two types of memory that he could purchase ()

24. Joy came across the following files that were stored in the system file folder: (i) Config.sys (ii) Autoexec.bat Explain the function of each these file. ()

25. Outline three functions of the system clock of a computer system ()

26. Differentiate between dumb and intelligent terminals, giving an example in each case ()

27. Android operating system have gained popularity in the recent years for use in smart device platform. Outline three features that have contributed their popularity ()

28. Joel, a student at a certain college compiled a term paper report on the following disk arm scheduling algorithms: (i) C-SCAN; (ii) Short seek time. Describe each of the algorithms. ()