A Smarter Way To Learn
Register
|
Login
|
Access Premium Content
Menu
Toggle navigation
AFRITUTOR
College Level
College Past Paper Answers
College Study Notes
Senior Secondary Level
Form 4 Lessons
Form 3 Lessons
Form 2 Lessons
Form 1 Lessons
Form 4 Exams
Form 3 Exams
Form 2 Exams
Form 1 Exams
Junior Secondary Level
Grade 7 Exams
Grade 8 Exams
Grade 9 Exams
Lower and Upper Primary Level
Grade 1 Exams
Grade 2 Exams
Grade 3 Exams
Grade 4 Exams
Grade 5 Exams
Grade 6 Exams
My Account
Profile
<=Back
<=KNEC Craft Certificate in ICT module 1 Operating Systems past paper: November 2016
Explain two benefits of virtual memory in a computer system
 Viewed:
319
times
Share in:
Question Answer:
Login to View Answer
Questions List:
1.
Joy acquired an operating system which she attempted to install in her desktop computer and had the following options displayed. (a) Repair; (b) Upgrade. Explain a circumstance that would necessitate her to apply each of the options.
2.
Explain the function of each the following terms as used in memory management: (a) Job control language; (b) Command language
3.
Define each of the following terms as used in memory management: (a) Overlay; (b) Thrashing
4.
Explain two benefits of virtual memory in a computer system
5.
Paul bought a laptop computer that he intends to share with his family member. outline four possible measures he could put in place to ensure his data is safe
6.
6. John created the following files and named them as follows: (a) June/1.doc (b) port@d.rtf; (c) Accounts=3.xls; (d) June>po.acc. State which of the following file names would be valid.
7.
Distinguish between pessimistic and optimistic looking as used in concurrent processing by an operating system
8.
Describe each of the following storage placement policies: (a) Best fit (b) First fit
9.
Distinguish between preemptive and non-preemptive scheduling algorithms as used in process management.
10.
Define each of the following terms as used in inter-process communication: (a) Signal; (b) Pipe.
11.
Explain the term device independence as applied in I/O device management.
12.
Distinguish between relative and absolute paths as applied in file management
13.
With the aid of a diagram describe the layered structure of an operating system
14.
Angela created a file and stored it in a secondary storage medium. Explain two possible attributes she could assign to the file.
15.
State one disadvantage of each of the following process scheduling methods: (i) First come first served; (ii) Short job first (iii) Round robin
16.
Rebecca intends to compile a report on the technique that the operating system uses to improve the performance of a disk. Explain three techniques she could include in the report.
17.
Karmas prefers to purchase an operating system with an NT file system over the one with FAT 32 system. Explain two reasons for his preference
18.
Explain the function of each of the following as used in memory management: (i) Address translation; (ii) Associative mapping (iii) Page table.
19.
With aid of a diagram, describe fixed memory partitioning technique
20.
With the aid of a diagram, describe the process control block as used in inter-process communication
21.
Outline three conditions of a deadlock in a system
22.
Explain each of the following terms as used in device I/O management: (i) Device driver; (ii) Device controller.
23.
Mr. Ketch intends to purchase a random access memory (RAM) from IT vendor. Explain two types of memory that he could purchase
24.
Joy came across the following files that were stored in the system file folder: (i) Config.sys (ii) Autoexec.bat Explain the function of each these file.
25.
Outline three functions of the system clock of a computer system
26.
Differentiate between dumb and intelligent terminals, giving an example in each case
27.
Android operating system have gained popularity in the recent years for use in smart device platform. Outline three features that have contributed their popularity
28.
Joel, a student at a certain college compiled a term paper report on the following disk arm scheduling algorithms: (i) C-SCAN; (ii) Short seek time. Describe each of the algorithms.