Eos - DCS2231 OS Sem3 22 - 23
Eos - DCS2231 OS Sem3 22 - 23
Eos - DCS2231 OS Sem3 22 - 23
Page 1 of 12
DCS2231 OPERATING SYSTEM CONFIDENTIAL
END-OF-SEMESTER EXAMINATION SEMESTER 3, 2022/2023
Page 2 of 12
DCS2231 OPERATING SYSTEM CONFIDENTIAL
END-OF-SEMESTER EXAMINATION SEMESTER 3, 2022/2023
A. User-level thread
B. Kernel-level thread
C. Lightweight thread
D. Heavyweight thread
Page 3 of 12
DCS2231 OPERATING SYSTEM CONFIDENTIAL
END-OF-SEMESTER EXAMINATION SEMESTER 3, 2022/2023
Page 4 of 12
DCS2231 OPERATING SYSTEM CONFIDENTIAL
END-OF-SEMESTER EXAMINATION SEMESTER 3, 2022/2023
23. What is the role of the page replacement algorithm in virtual memory?
A. To allocate physical memory to processes
B. To ensure that there is enough space in the virtual memory
C. To decide which page should be replaced when there is a page fault
D. To reduce the fragmentation of the physical memory
26. What is the difference between internal fragmentation and external fragmentation?
Page 5 of 12
DCS2231 OPERATING SYSTEM CONFIDENTIAL
END-OF-SEMESTER EXAMINATION SEMESTER 3, 2022/2023
30 What is the role of the TLB (Translation Lookaside Buffer) in virtual memory?
A. To store the page table in the main memory
B. To store the page table in the CPU cache
C. To speed up the translation of virtual addresses to physical addresses
D. To store the page replacement algorithm
Page 6 of 12
DCS2231 OPERATING SYSTEM CONFIDENTIAL
END-OF-SEMESTER EXAMINATION SEMESTER 3, 2022/2023
Page 7 of 12
DCS2231 OPERATING SYSTEM CONFIDENTIAL
END-OF-SEMESTER EXAMINATION SEMESTER 3, 2022/2023
41. Which type of attack involves tricking a user into providing sensitive information,
such as a password or credit card number?
A. Phishing
B. Social engineering
C. Denial of Service (DoS)
D. Exploit
Page 8 of 12
DCS2231 OPERATING SYSTEM CONFIDENTIAL
END-OF-SEMESTER EXAMINATION SEMESTER 3, 2022/2023
43. Which type of attack attempts to exploit a vulnerability in software to gain access to
a system?
A. Phishing
B. Social engineering
C. Denial of Service (DoS)
D. Exploit
44. What is the process of ensuring that data is protected from unauthorized access?
A. Encryption
B. Authentication
C. Authorization
D. Auditing
Page 9 of 12
DCS2231 OPERATING SYSTEM CONFIDENTIAL
END-OF-SEMESTER EXAMINATION SEMESTER 3, 2022/2023
48. Which type of attack involves sending large amounts of traffic to a system to
overwhelm it and prevent legitimate users from accessing it?
A. Phishing
B. Social engineering
C. Denial of Service (DoS)
D. d. Exploit
50. What is the type of access control where users are granted access based on their job
responsibilities?
A. Role-based access control
B. Discretionary access control
C. Mandatory access control
D. Rule-based access control
Page 10 of 12
DCS2231 OPERATING SYSTEM CONFIDENTIAL
END-OF-SEMESTER EXAMINATION SEMESTER 3, 2022/2023
Page 11 of 12
DCS2231 OPERATING SYSTEM CONFIDENTIAL
END-OF-SEMESTER EXAMINATION SEMESTER 3, 2022/2023
TABLE A
Transition Waiting Ready Terminated Running Standby
Page address 2 3 2 1 5 2 4 5 3 2 5 2
stream
4. One of the most common threats to security is the intruder, often referred to as a
hacker or cracker. Name and explain the three classes of intruders. (6
marks)
5. Redraw and complete the file allocation table for the following figure. (6
marks)
Page 12 of 12
DCS2231 OPERATING SYSTEM CONFIDENTIAL
END-OF-SEMESTER EXAMINATION SEMESTER 3, 2022/2023
File B
File C
File D
File E
~ End of Page ~
Page 13 of 12