[go: up one dir, main page]

0% found this document useful (0 votes)
116 views7 pages

Operating System Syllabus

The document outlines the syllabus for an Operating Systems course, detailing its objectives, learning outcomes, and course structure across five units. It covers key concepts such as process management, memory management, file management, and computer security, along with recommended co-curricular activities and assessment methods. Additionally, it includes a lab component focused on practical implementations using C/Java.

Uploaded by

Anitha Yarava
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
116 views7 pages

Operating System Syllabus

The document outlines the syllabus for an Operating Systems course, detailing its objectives, learning outcomes, and course structure across five units. It covers key concepts such as process management, memory management, file management, and computer security, along with recommended co-curricular activities and assessment methods. Additionally, it includes a lab component focused on practical implementations using C/Java.

Uploaded by

Anitha Yarava
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Semester Course Code Course Title Hours Credits

IV C5 OPERATING SYSTEMS 60 2

Objectives:
This course aims to introduce the structure and organization of a file system. It emphasizes
various functions of an operating system like memory management, process management,
device management, etc.

Course Learning Outcomes:


Upon successful completion of the course, a student will be able to:
1. Know Computer system resources and the role of operating system in resource
management with algorithms
2. Understand Operating System Architectural design and its services.
3. Gain knowledge of various types of operating systems including Unix and Android.
4. Understand various process management concepts including scheduling,
synchronization, and deadlocks.
5. Have a basic knowledge about multithreading.
6. Comprehend different approaches for memory management.
7. Understand and identify potential threats to operating systems and the security
features design to guard against them.
8. Specify objectives of modern operating systems and describe how operating systems
have evolved over time.
9. Describe the functions of a contemporary operating system

UNIT- I

Introduction: What is Operating System? History and Evolution of OS, Basic OS functions,
Resource Abstraction, Types of Operating Systems– Multiprogramming Systems, Batch
Systems, Time Sharing Systems, Parallel Systems, Distributed Systems, Operating Systems
for Personal Computers, Real time Systems.
UNIT- II
Process Management: Process Concept, Process Scheduling, Operation on Processes,
Cooperating Processes, Threads, Inter process Communication.
CPU Scheduling: Basic concepts, Scheduling Criteria, Scheduling Algorithms, Multiple-
Processor Scheduling.

UNIT III
Process Synchronization: Introduction, the Critical Section Problem, Semaphores,
Classical Problems of Synchronization, Monitors.
Deadlocks: Deadlock Characterization, Methods for Handling Deadlocks, Deadlock
Prevention, Deadlock Avoidance and Deadlock Detection and Recovery.

UNIT IV
Memory Management: Physical and Virtual Address Space; Memory Allocation Strategies–
Fixed and -Variable Partitions, Paging, Segmentation.
Virtual Memory: Demand Paging, Page replacement Algorithms, Thrashing, Demand
Segmentation.

UNIT V

File Management & Secondary Storage: Directory Structure, File Operations, File
Allocation Methods. Disk Structure, Disk Scheduling, Disk Management.
Computer Security Threats: Computer Security Concepts, Threats, Attacks and Assets,
Intruders, Malicious Software, Viruses, Worms and Bots, Rootkits. Computer Security
Techniques: Authentication, Access Control, Intrusion Detection, Malware Defense.

REFERENCE BOOKS:
1. Operating System Principles by Abraham Silberschatz, Peter Baer Galvin and Greg
Gagne (8thEdition) Wiley India Edition.
2. Operating Systems: Internals and Design Principles by Stallings (Pearson)
3. Operating Systems by J. Archer Harris (Author), Jyoti Singh (Author) (TMH)
4. Online Resources for UNIT V

5. http://vlabs.iitb.ac.in/vlabs-dev/vlab_bootcamp/bootcamp/CRUX/labs/exp1/index.html
RECOMMENDED CO-CURRICULAR ACTIVITIES:
(Co-curricular activities shall not promote copying from textbook or from others work and
shall encourage self/independent and group learning)

A. Measurable
1. Assignments (in writing and doing forms on the aspects of syllabus content and outside
the syllabus content. Shall be individual and challenging)
2. Student seminars (on topics of the syllabus and related aspects (individual activity))
3. Quiz (on topics where the content can be compiled by smaller aspects and data
(Individuals or groups as teams))
4. Study projects (by very small groups of students on selected local real-time problems
pertaining to syllabus or related areas. The individual participation and contribution of students
shall be ensured (team activity
B. General
1. Group Discussion
2. Try to solve MCQ’s available online.
3. Others

RECOMMENDED CONTINUOUS ASSESSMENT METHODS:


Some of the following suggested assessment methodologies could be adopted;
1. The oral and written examinations (Scheduled and surprise tests),
2. Closed-book and open-book tests,
3. Programming exercises,
4. Practical assignments and laboratory reports,
5. Observation of practical skills,
6. Individual and group project reports.

7. Efficient delivery using seminar presentations,


8. Viva-Voce interviews.
9. Computerized adaptive testing, literature surveys and evaluations,
10. Peers and self-assessment, outputs form individual and collaborative work
Semester Course Code Course Title Hours Credits
IV C-5 OPERATING SYSTEMS LAB 30 2
USING C /Java

1. Study of software and hardware requirements for different operating systems


(UNIX, LINUX, WINDOWSXP, WINDOWS7/8)
2. Execute various UNIX system call for
i. Process Management
ii. File Management
iii. Input/output System Calls
3. Implement CPU Scheduling polices:
i. SJF
ii. FCFS
4. Implement CPU Scheduling polices
i. Round Robin
ii. Priority
5. Write a program for Bankers Algorithm for Dead Lock Avoidance.
6. Implement file storage allocation techniques.
i.Continious (Using Array)
ii. Linked List (Using Linked List)
iii. Indirect Allocation (Indexing)
7. Calculation of external and Internal Fragmentation
8. Implement Continuous memory allocation techniques.
i. worst fit
ii. Best fit
iii. First fit
9. Implement the solution for produce-consumer problem using the inter process
communication techniques - Semaphores.
10. Implementation of Resource allocation graph.
Govt. College for Men(A), Kadapa
II BSc - Semester - III
Name of the paper: Database Management System
Model Question Paper
Time: 3Hrs. Maximum marks: 60

SECTION - I
Answer any FIVE of the following Questions: (5 × 4 = 20 Marks)
1. Explain Database Management System with an example?
2. List out Advantages of DBMS?
3. Explain Relationships in relational database?
4. Define entity and types of entities?
5. Define Relational Integrity?
6. Explain Data types in SQL?
7. List out Data Definition language commands?
8. What is Structure of PL/SQL program?

SECTION - II

Answer any FIVE of the following questions choosing ONE from each unit.
Each question carries 8 marks. (5 x 8 = 40 Marks)

UNIT - I
9. What is File based system. List out drawbacks of File based system?
(Or)
10. Explain Database Architecture?
UNIT - II
11. Explain Generalization and Specialization?
(Or)
12. Explain Building blocks of Entity relationship model?

UNIT - III

13. Explain the operations of Relational algebra?


(Or)
14. Explain in detail about Codd’s Rules?
UNIT - IV
15. Explain Data Manipulation commands with examples?
(Or)
16. Explain Aggregate functions with examples?

UNIT - V

17. Explain steps to create a PL/SQL program?


(Or)
18. Explain steps to create a Cursor in PL/SQL?
Govt.College for Men(A), Kadapa
II BSc Semester–IV
Name of the paper: OOP’s Through JAVA
(Theory)
Model Question Paper
Time: 3Hrs. Maximum marks: 60

SECTION - I

Answer any FIVE of the following questions. Each question carries 4 marks. 5 x 4 = 20 Marks.

1. Define Java Virtual Machine in detail.

2. Write about various types of Operators in JAVA.

3. What is Method Overloading? Explain it with suitable example.

4. Explain Command line arguments with suitable example.

5. Define Polymorphism, Explain with suitable example.

6. How to create a file using FileOutputStream.


7. Define Error. Explain different types of Errors in JAVA Program.

8. Explain Thread Priorities in detail.


SECTION - II

Answer any FIVE of the following questions choosing ONE from each unit.
Each question carries 8 marks. 5 x 8 = 40 Marks.

1. Write about the features of JAVA.


[OR]
2. Explain Control Statements in JAVA.
3. Define Array. Explain types of Arrays in JAVA.
[OR]
4. Write about the features of JAVA.
5. Define Interface. How Multiple Inheritance using Interfaces in JAVA Program.
[OR]
6. Define Package. Explain different types of Packages using JAVA.
7. Explain about Exception Handling in detail.
[OR]
8. Describe about database accessing using JDBC.
9. Describe about Life cycle of Thread.
[OR]
10. Describe about Life cycle of Applet.
Govt.College for Men(A), Kadapa
II B.Sc. Semester–IV
Name of the paper: Operating systems
(Theory)
Model Question Paper
Time: 3Hrs. Maximum marks: 60

SECTION - I

Answer any FIVE of the following questions. Each question carries 4 marks. 5 x 4 = 20 Marks.

1. Explain the characteristics OS functions?


2. Describe Types of Operating Systems?
3. What is process? Explain the different types of process?
4. What is thread? Explain user level threads?
5. Write a short note on Deadlock Characterization with an example?
6. Demand Paging with an example?
7. What is Computer Security Concepts with examples?
8. Explain about Access Control?

SECTION - II

Answer any FIVE of the following questions choosing ONE from each unit.
Each question carries 8 marks. 5 x 8 = 40 Marks.
9. What is Operating System? Explain History and Evolution of OS?
(OR)
10. Describe Operating Systems for Personal Computers, Real time Systems?
11. Explain any two Process Scheduling algorithms with an example?
(OR)
12. Describe about various types of Multiple-Processor Scheduling with examples?

13. Explain the Critical Section Problem with examples?


(OR)
14. Discuss Deadlock Avoidance and Deadlock Detection and Recovery examples?

15. Explain Physical and Virtual Address Space with an example?


(OR)
16. Write about Segmentation?

17. Write a program for passing arguments to functions using pointers?


(OR)
18. What Authentication, Access Control, Intrusion Detection with an example?

You might also like