A Smarter Way To Learn
Register
|
Login
|
Access Premium Content
Menu
Toggle navigation
AFRITUTOR
College Level
College Past Paper Answers
College Study Notes
Senior Secondary Level
Form 4 Lessons
Form 3 Lessons
Form 2 Lessons
Form 1 Lessons
Form 4 Exams
Form 3 Exams
Form 2 Exams
Form 1 Exams
Junior Secondary Level
Grade 7 Exams
Grade 8 Exams
Grade 9 Exams
Lower and Upper Primary Level
Grade 1 Exams
Grade 2 Exams
Grade 3 Exams
Grade 4 Exams
Grade 5 Exams
Grade 6 Exams
My Account
Profile
<=Back
<=KNEC Diploma in ICT module I Operating systems past paper: July 2016
Explain two types of virtual memory replacement policy strategy
 Viewed:
410
times
Share in:
Question Answer:
Login to View Answer
Questions List:
1.
Explain the term interrupt as used in operating system
2.
Describe the term swapping as used in memory management
3.
Outline four types of computer registers
4.
Explain three roles of process control block in operating system
5.
Outline two objectives of designing an operating system
6.
Most processor supports at least two modes of process execution. Explain the modes that would be supported.
7.
Explain each of the following terms as used in operating system i)Time slice ii)Thread
8.
James was required to design an operating system that would perform a number of essentially independent tasks that don’t need to be serialized. (i) Identify the appropriate processing technique that he could use justify your answer ii)Outline four advantages of the processing technique identified in (i).
9.
Explain the term process spawning as used in operating system
10.
Differentiate between cluster and sector as applied to the physical storage disk.
11.
Joys intends to buy an I/O device for her computer. Outline four factors she could consider other than cost
12.
Outline three disadvantages of system buffering in I/O communication
13.
Mitchell was required to investigate characteristics of First in, First Out (FIFO) disk scheduling algorithm system. Describe two typical characteristics that she could have established
14.
A lecturer explained the desirable qualities of a file organization to a class. Outline five qualities that he could be possibly facing
15.
Reader company ltd is experiencing data security threats. Outline four threats that the company could be facing.
16.
Pato installed a micro kernel operating system in his computer. Explain two benefits that he could realize while using it
17.
Outline three typical address information in a file directory
18.
Define the term key field as used in file management
19.
Typically, users are granted certain access rights to a file. Outline five examples of access rights that can be assigned to a user
20.
Outline two problems that could be experienced with fixed memory partitioning
21.
Differentiate between block-oriented and stream-oriented devices
22.
Memory paging is a popular technology in operating systems. Explain two advantages of the technology that could be influencing its trend
23.
Outline four desirable features of a file system
24.
Differentiate between memory address register (MAR), and memory buffer register (MBR), as applied in operating system
25.
Outline four reasons that would render a process into suspension state
26.
Figure 1 shows a virtual memory addressing scheme in an operating system. Explain the two memory address labelled I, and II
27.
Outline two requirements for a virtual memory in computer
28.
Differentiate between a parent process and a child process
29.
Define the term thrashing as used in memory management
30.
Explain two types of virtual memory replacement policy strategy
31.
Figure 1 shows typical file allocation methods. Use it to answer the question that follows (i)Describe the file allocation methods depicted in the diagram (ii)Outline two advantages of the file allocation method described in (i). (iii)Explain two strategies that could be adapted to conserve disk when using file allocation method described in (i).
32.
For each of the following tasks identify appropriate file Operation that could be used; (i) Replacing filename; (ii) Display file content; (iv)Formatting a disk that contains files; (v)Store a new file in disk
33.
Lucky was investigating factors that influence deadlocks in an operating system. Outline four factor that could be established.
34.
Programmers encounter several challenges when using memory overlay in operating system. Explain two challenges that they are likely to experience
35.
Nancy intends to develop an operating system that would support several types of RAID configurations. Explain two types of RAID configuration she should consider
36.
The CPU uses several types of interrupts that handles I/O communications in a computer. Outline four types of interrupts that could be used in a computer
37.
Explain the term frame as applied in memory management
38.
Differentiate between fetch and cleaning policies as applied in virtual memory
39.
Clifford was required to design a general-purpose time-sharing system for his client (i)Describe the most appropriate process scheduling technique that he could use. ii)Outline two disadvantages of process scheduling algorithm described in (i) above Explain one factor that affects performance in the process scheduling technique described in (i)
40.
Memory segmentation allows performance to create memory references in their design. Outline four advantages programmer could realize using memory references
41.
Distributed operating system are widely used in many organizations. Explain two features that could be influencing the trend