Question: operating systems thank you 1. What are the three main purposes of an operating system? 2. We have stressed the need for an operating system

 operating systems thank you 1. What are the three main purposes

of an operating system? 2. We have stressed the need for an

operating system to make efficient use of the computing hardware. When is

it appropriate for the operating system to forsake this principle and to"waste resources? Why is such a system not really wasteful? 3. What

is the main difficulty that a programmer must overcome in writ- ing

an operating system for a real-time environment? 4. Keeping in mind the

operating systems thank you

1. What are the three main purposes of an operating system? 2. We have stressed the need for an operating system to make efficient use of the computing hardware. When is it appropriate for the operating system to forsake this principle and to "waste resources? Why is such a system not really wasteful? 3. What is the main difficulty that a programmer must overcome in writ- ing an operating system for a real-time environment? 4. Keeping in mind the various definitions of operating system, consider whether the operating system should include applications such as web browsers and mail programs. Argue both that it should and that it should not, and support your answers. 5. How does the distinction between kernel mode and user mode function as a rudimentary form of protection (security)? 6. Which of the following instructions should be privileged? (a) Set value of timer. (b) Read the clock. (c) Clear memory. (d) Issue a trap instruction. (e) Turn off interrupts. (f) Modify entries in device-status table. (g) Switch from user to kernel mode. (h) Access I/O device. 1 7. Some early computers protected the operating system by placing it in a memory partition that could not be modified by either the user job or the operating system itself. Describe two difficulties that you think could arise with such a scheme. 8. Some CPUs provide for more than two modes of operation. What are two possible uses of these multiple modes? 9. Timers could be used to compute the current time. Provide a short description of how this could be accomplished. 10. Give two reasons why caches are useful. What problems do they solve? What problems do they cause? If a cache can be made as large as the device for which it is caching (for instance, a cache as large as a disk), why not make it that large and eliminate the device? 11. Distinguish between the client-server and peer-to-peer models of dis- tributed systems 12. How do clustered systems differ from multiprocessor systems? What is required for two machines belonging to a cluster to cooperate to provide a highly available service? 13. Consider a computing cluster consisting of two nodes running a database. Describe two ways in which the cluster software can manage access to the data on the disk. Discuss the benefits and disadvantages of each. 14. What is the purpose of interrupts? How does an interrupt differ from a trap? Can traps be generated intentionally by a user program? If so, for what purpose? 15. Explain how the Linux kernel variables HZ and jiffies can be used to determine the number of seconds the system has been running since it was booted. 16. Direct memory access is used for high-speed I/O devices in order to avoid increasing the CPU's execution load. (a) How does the CPU interface with the device to coordinate the transfer? (b) How does the CPU know when the memory operations are com- plete? 18. Many SMP systems have different levels of caches; one level is local to each processing core, and another level is shared among all processing cores. Why are caching systems designed this way? 19. Rank the following storage systems from slowest to fastest: (a) Hard-disk drives (b) Registers (c) Optical disk (d) Main memory (e) Nonvolatile memory (f) Magnetic tapes (g) Cache 20. Consider an SMP system similar to the one shown in Figure 1.8. Illus- trate with an example how data residing in memory could in fact have a different value in each of the local caches. 21. Discuss, with examples, how the problem of maintaining coherence of cached data manifests itself in the following processing environments: (a) Single-processor systems (b) Multiprocessor systems (c) Distributed systems 22. Describe a mechanism for enforcing memory protection in order to prevent a program from modifying the memory associated with other programs. 23. Which network configuration-LAN or WAN-would best suit the fol- lowing environments? 3 (a) A campus student union (b) Several campus locations across a statewide university system (c) A neighborhood 24. Describe some of the challenges of designing operating systems for mo- bile devices compared with designing operating systems for traditional PCs. 25. What are some advantages of peer-to-peer systems over client-server systems? 26. Describe some distributed applications that would be appropriate for a peer-to-peer system. 27. Identify several advantages and several disadvantages of open-source operating systems. Identify the types of people who would find each aspect to be an advantage or a disadvantage

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!