Monday 27 November 2017

INFORMATION SYSTEM MANAGEMENT IIBM EXAM ANSWER SHEET PROVIDED MOB OR WHATSAPP 91 9924764558

IIBM EXAM ANSWER SHEETS PROVIDED.  MBA EMBA BMS DMS ANSWERS PROVIDED.  DR. PRASANTH MBA PH.D. DME MOBILE / WHATSAPP: +91 9924764558 OR +91 9447965521 EMAIL: prasanththampi1975@gmail.com WEBSITE: www.casestudyandprojectreports.com

Examination Paper of Information System Management
5
IIBM Institute of Business Management
IIBM Institute of Business Management
Examination Paper MM.100
Operating Systems
Section A: Objective Type (20 marks)
 This section consists of Multiple Choice Questions & Fill in the blanks / True & False.
 Answer all the questions.
 Each Question carries 1 mark.
Part One:
Multiple Choices:
1. The PCD data is allocated using a data Structure is called______________
a. Heap
b. Object Module
c. Tag
d. Head
2. Process is
a. Language of programme
b. Name of a computer software
c. An execution of programme
d. None of the above
3. Streaming tape can store record
a. Without a break irrespective of its size
b. With a break in size of record
c. Of size 10 kb
d. Both (a) & (c)
4. _______________is a policy decision based on the page reference information available in the page table.
a. Memory Allocation
b. Shared Pages
c. Page Replacement
d. Memory Mapping
5. Remote procedure call (RPC) is used by an application execute
a. To execute a procedure in the system
b. To execute a procedure in another compute in the distributed system
c. Name of a software
d. None of the above
Examination Paper of Information System Management
6
IIBM Institute of Business Management
6. Multiprocessor computer system provides
a. Slow performance by serving several processes simultaneously
b. High performance by serving several processes simultaneously
c. High performance by serving one process
d. None of the above
7. Remote procedure call (RPC) is used by an application execute
a. To execute a procedure in the system
b. To execute a procedure in another compute in the distributed system
c. Name of a software
d. None of the above
8. A distributed transaction is also called
a. Single-site transaction
b. Two –site transaction
c. Multi-site transaction
d. Both (a) & (b)
9. File control block (FCB) contains all information concerning
a. A file processing activity
b. Execution activity
c. Both (a) & (b)
d. None of the above
10. Non-uniform memory architecture system consists of number of nodes and each node consists
a. Monitor
b. Register
c. Both (a) & (b)
d. 1 or more C.P.Us
True & False:
1. CPU helps in effective memory management by an OS.
2. High reliability in distributed file systems can be ensured through sharing semantics.
3. The compatible time sharing system for the IBM 7094 was one of the first time sharing systems.
4. The Processors of multiprocessors are divide into processor sets.
5. A resource rank is associated with each resource class.
6. A cached directory is a copy of directory that exists at a primary site.
7. A cluster of nodes is a section of the distributed system that contains sufficient hardware and software resources.
Examination Paper of Information System Management
7
IIBM Institute of Business Management
8. A cycle is a sufficient condition for a deadlock in MISR system
9. File system integrity implies correctness and consistency of control data and operations of the file system.
10. A mathematical model consists of three components model of the server
Section B: Short Questions (20 marks)
 This section consists of Short Questions (Answer should be in 5 Line).
 Answer all the questions.
 Each Question is of 5 marks.
1. What do you mean by “Authentication”?
2. Distinguish between File System and IOCS.
3. Define “Segmentation with Paging”.
4. Describe the Deadlock characteristics for different resource system.
Section C: Long Questions (30 marks)
 This section consists of Long Questions (Word Limit 100 words)
 Each question carries 10 marks.
 Attempt any three Questions.
1. Write a Short Note on “Structure of an Operating System”.
2. Define Request-Reply-Acknowledgement Protocol and Explain a Blocking version of RRA Protocol.
3. Explain how starvation is avoided the UNIX and Window system?
4. Discuss influence of disk scheduling algorithms on effectiveness of I/O buffering?
END OF SECTION B
END OF SECTION A
Examination Paper of Information System Management
8
IIBM Institute of Business Management
Section D: Applied Theory (30 marks)
 This section consists of Applied Theory Questions.
 Answer all the Questions
 Each question carries 15 marks.
 Detailed information should form the part of your answer (Word limit 200 to 250 words).
1. Describe why authentication is important for file protection?
2. Show actions of the basic and control parts of a process to important Ricart-Agrawala Algorithm?
S-2-301012
END OF SECTION D
END OF SECTION C

No comments:

Post a Comment