KNEC Diploma in ICT module I Operating systems past paper: July 2016 Answers

This paper has been solved by experts and examiners

Course Name:  Information and Communication Technology
Also Done By:
CICT Module 1
Course Level:  Diploma
Sub Level:       Module I
Course Unit:   Operating Systems
Exam body:    KNEC

Share with Friends:
        
Go Back



1. Explain the term interrupt as used in operating system ()

2. Describe the term swapping as used in memory management ()

3. Outline four types of computer registers ()

4. Explain three roles of process control block in operating system ()

5. Outline two objectives of designing an operating system ()

6. Most processor supports at least two modes of process execution. Explain the modes that would be supported. ()

7. Explain each of the following terms as used in operating system i)Time slice ii)Thread ()

8. James was required to design an operating system that would perform a number of essentially independent tasks that don’t need to be serialized. (i) Identify the appropriate processing technique that he could use justify your answer ii)Outline four advantages of the processing technique identified in (i). ()

9. Explain the term process spawning as used in operating system ()

10. Differentiate between cluster and sector as applied to the physical storage disk. ()

11. Joys intends to buy an I/O device for her computer. Outline four factors she could consider other than cost ()

12. Outline three disadvantages of system buffering in I/O communication ()

13. Mitchell was required to investigate characteristics of First in, First Out (FIFO) disk scheduling algorithm system. Describe two typical characteristics that she could have established ()

14. A lecturer explained the desirable qualities of a file organization to a class. Outline five qualities that he could be possibly facing ()

15. Reader company ltd is experiencing data security threats. Outline four threats that the company could be facing. ()

16. Pato installed a micro kernel operating system in his computer. Explain two benefits that he could realize while using it ()

17. Outline three typical address information in a file directory ()

18. Define the term key field as used in file management ()

19. Typically, users are granted certain access rights to a file. Outline five examples of access rights that can be assigned to a user ()

20. Outline two problems that could be experienced with fixed memory partitioning ()

21. Differentiate between block-oriented and stream-oriented devices ()

22. Memory paging is a popular technology in operating systems. Explain two advantages of the technology that could be influencing its trend ()

23. Outline four desirable features of a file system ()

24. Differentiate between memory address register (MAR), and memory buffer register (MBR), as applied in operating system ()

25. Outline four reasons that would render a process into suspension state ()

26. Figure 1 shows a virtual memory addressing scheme in an operating system. Explain the two memory address labelled I, and II ()

27. Outline two requirements for a virtual memory in computer ()

28. Differentiate between a parent process and a child process ()

29. Define the term thrashing as used in memory management ()

30. Explain two types of virtual memory replacement policy strategy ()

31. Figure 1 shows typical file allocation methods. Use it to answer the question that follows (i)Describe the file allocation methods depicted in the diagram (ii)Outline two advantages of the file allocation method described in (i). (iii)Explain two strategies that could be adapted to conserve disk when using file allocation method described in (i). ()

32. For each of the following tasks identify appropriate file Operation that could be used; (i) Replacing filename; (ii) Display file content; (iv)Formatting a disk that contains files; (v)Store a new file in disk ()

33. Lucky was investigating factors that influence deadlocks in an operating system. Outline four factor that could be established. ()

34. Programmers encounter several challenges when using memory overlay in operating system. Explain two challenges that they are likely to experience ()

35. Nancy intends to develop an operating system that would support several types of RAID configurations. Explain two types of RAID configuration she should consider ()

36. The CPU uses several types of interrupts that handles I/O communications in a computer. Outline four types of interrupts that could be used in a computer ()

37. Explain the term frame as applied in memory management ()

38. Differentiate between fetch and cleaning policies as applied in virtual memory ()

39. Clifford was required to design a general-purpose time-sharing system for his client (i)Describe the most appropriate process scheduling technique that he could use. ii)Outline two disadvantages of process scheduling algorithm described in (i) above Explain one factor that affects performance in the process scheduling technique described in (i) ()

40. Memory segmentation allows performance to create memory references in their design. Outline four advantages programmer could realize using memory references ()

41. Distributed operating system are widely used in many organizations. Explain two features that could be influencing the trend ()