KNEC Diploma in ICT module I Operating systems past paper: November 2013 Answers

Answered and verified

Course Name:  Information and Communication Technology
Also Done By:
CICT mudule 1
Course Level:  Diploma
Sub Level:       Module I
Course Unit:   Operating Systems
Exam body:    KNEC

Share with Friends:
        
Go Back



1. Define each of the following terms as used in computer operating system i)Shell ii)System call iii)Buffer ()

2. Explain each of the following inter process communication methods i)Semaphore ii)Signal ()

3. With the aid of a diagram, describe the NTFS file systems ()

4. Describe single streaming batch processing as used in operating system ()

5. Lara, database administrator used each of the following file lock mechanism in her design. Explain the results from each lock when enforced i)File lock ii) Write lock ()

6. Distinguish between coherency and inclusion as used in memory management ()

7. With the aid of the diagram, Describe each of the following memory allocation techniques: (I) Fixed partitioned allocations (ii) Paged allocation ()

8. June came across the following file name extension during a lesson. Identify the file type for each extension. (i) .bmp (ii) .xlsx iii).rar iv).exe ()

9. Jeremy prefer in the online method when storing his company’s file. Outline two reasons for his preference ()

10. Outline the criteria that could be used when choosing a schedule algorithm for an operating system. ()

11. Purity prefer the command line user interface over the GUI for her computer. Explain three reasons for this prefers ()

12. Differentiate between reusable and consumable resources as used in process in inter-process communication ()

13. Explain three reasons that could cause a process to be suspended ()

14. list four examples of utility programs used in computers ()

15. Differentiate between spatial locality and sequential locality as used in memory management: ()

16. Describe each of the following terms as used in file management (4 mks). (i)Alias file name; (ii)Pathnames; ()

17. Joss used the RAID and disk caching to help improve the performance of the disk. Describe each of the following technique as used in the file management ()

18. With the aid of a diagram, describe the structure of the I/O control system ()

19. Define each of the following terms as used in memory management: (i)Thrashing ii)Starvation ()

20. With the aid of diagram, describe the round robin scheduling algorithm as used in computer operating system ()

21. Describe each of the following terms as used in process management: (4 marks) (i) race condition ii) Critical section ()

22. During an operating system lesson the teacher addressed various function of the software clock. Explain three such function that the teacher could have discussed ()

23. Define each of the following terms as used in operating system; (4 marks) (i) Device independence ii)Virtual device ()

24. Explain the circumstances under which each of the following disk system algorithm could be applicable. (6 marks) (i) first come first served (ii) shorted seek time first (iii)SCAN ()

25. Distinguish between software interrupt and trap as used in operating systems ()

26. Explain the function of each of the following terms as used in memory management; (6 marks) (i)relocating loader (ii) job control language (iv)Segmentation ()

27. Define each of the following terms as used in memory management; (i)Dispatch latency ()

28. Joan came across the following DOS commands when revising for her operating system examination. CD, DIR, FORMAT, BACKUP, RESTORE, CLS. Categorize each of them as either external or internal commands ()

29. Differentiate between each of the following replacement policies as used in memory management i) Least recently used ii) Not recently used ()

30. During an operating system class, peter came across the following file attributes. Explain the function of each of the attributes. (6 marks) (i) archive ii)hidden iii) System ()

31. Define each of the following terms as used in operating system: (4 marks) (i) Address translation ii) Address exception ()

32. With the aid of a diagram, describe the message passing as used in inter process communication ()

33. During revision for an operating system paper, ken came across the term metaphors. Outline two function of this facility ()