[go: up one dir, main page]

0% found this document useful (0 votes)
35 views11 pages

2014 N

revision paper

Uploaded by

Steven Nzomo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
35 views11 pages

2014 N

revision paper

Uploaded by

Steven Nzomo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 11
_Index No. 1920/106 Signature OPERATING SYSTEMS. November 2014 Date Time: 3 hours THE KENYA NATIONAL EXAMINATIONS COUNCIL CRAFT CERTIFICATE IN INFORMATION TECHNOLOGY OPERATING SYSTEMS 3 hours INSTRUCTIONS TO CANDIDATES Write your name and index number in the spaces provided above. Sign and write the date of examination in the spa led above. This paper consists of 15 (FIFTEEN) questions in THO sections: A and B Answer ALL the questions in Section A in the are rovided after each question. Answer any FOUR questions in Seetion B in ices provided affer each question. Candidates should answer the questions in Pa Examiner's Use Only Maximum | Candidates score score 1-10 40 u 15 12 15 13 15 14 15 15 15 Total score Question ‘This paper consists of 12 printed pages Candidates should check the question paper to ascertain that all the Pages are printed as indicated and that no questions are missing. © 2014 The Kenya National Examinations Council Turn over SECTION A (40 MARKS) Answer ALL the questions in this section in the spaces provided. (a) Define the term hit ratio as used in memory management, (2 marks) (>) Outline the function of virtual file systems in operating systems, (2 marks) Distinguish between protected and supervisor modes as used in operating systems. (4 marks) Define each of the following terms as us (audit trail; (2 marks) (ii) firewall, (2 marks) Distinguish between manual and automatic software installation as used in systems, (4 marks) 1920/106 2 5. Describe each of the following terms as used in memory management: (i) relocating loader; (2 marks) (ii) direct memory access. (2 marks) 6. Explain the circumstance under which each of the following file operations could be applied: (i) append; (2 marks) (ii) delete. (2 marks) 7. Outline the functions of each of the following concepts as used in operating systems: Explain cach of the following types of locking mechanisms as applied in operating systems: @ shared (0); (2 marks) (ii) exclusive (S). Define each of the following terms as used in memory management: ()— deadiock; (marks) i) starvation. (2 marks) Distinguish between disk defragmenter and disk cleanup as used in operating systems. (4 marks) 1920/106 4 SECTION B (60 MARKS) Answer Any FOUR questions in this section in the spaces provided. 11, (@)__ Explain each of the following types of operating systems stating the most appropriate atea where it could be applied: (i) real time operating system; (3 marks) (i) distributed operating system. (3 marks) (b) The following is a list of different ex: of software; classify them as either operating system or application sot (3 marks) Android, Ms Office 2010, Unig eee, Ms Windows XP, Lotus 1-2-3. (c) Yuma a computer operating systems expert has been invited by Jumbo College to give a brief description of NT file systems. Explain three advantages of NTFS that he could mention, (6 marks) 1920/106 5 ‘Turn over 12, (@) Define addressibitity as used in computer memory. (I mark) (©) Differentiate between the bes fi and first fi policies as used in memory ‘management, (4 marks) (©) Explain the function of each of the following as used in operating systems: @ pipe; (2 marks) (ii) signal, (2 marks) 1920/106 (@) With the aid of a diagram, describe the paged memory management technique: (6 marks) 13. (@)_ Explain each of the following replacement policies as used in memory management: (least recently used; (2: marks) (ii) not recently used. (2 marks) 1920/106 1 ‘Turn over (6) ABZ Bank has integrated the use of redundant arrays of independent disks (RAIDS) in their operations, Explain two advantages that the bank is likely to achieve from the use of this disk. (4 marks) Johanna intends to purchase an operating system for his computer. Outline two factors that he should consider. (4 marks) = = = ‘The operating system performs several functions one of them being job control. Explain two ways in which the operating system carries out this function, (3 mark) 14, (a) Outline the function of each of the following commands as used in operating systems: @ dir (1 mark) 1920/106 8 With the aid of a diagram, describe the following methods of file organizations: (ii) sequential; (G marks) (iii) indexed. = & 2 Explain the circumstance that cont aus a process to be in each of the following states: (i) blocked; (2 marks) 1920/106 9 Turn over @ Jake prefers a GUT command driven interface. Explain three features that could have influenced his preference. (G marks) 1S. @__Define the term throughput as used in operating systems, (1 mark) (©) Outline two functions of metaphors in open systems. (2 marks) (©) Lenora came across the following file attributes when revising for her operating systems examination, Explain the function of each of the attribute: @ — No-dump; (2.marks) Gi) system; (2 marks) 1920/06 10 (iii) archive. @ Operating systems are designed to prevent deadlock. Outline three ways in which operating systems achieve this function. (6 marks) 1920/106 u Turn over

You might also like