PART A — 2 MARKS 1. What is an operating system? 2. What is the main advantage

PART A — 2 MARKS
1. What is an operating system?
2. What is the main advantage of the layered approach to system design?
3. What is the objective of multiprogramming? 4. What is critical-section problem? 5. What is a binary semaphore? 6. List the necessary conditions for deadlock. 7. What is memory management unit? 8. What is segmentation? 9. What is a file control block? 10. List the methods for allocating disk space.
11. What is the role of operating system in computer I/O? 12. What is encryption?
13State any two advantages of multiprocessor systems.
14.Name any two CPU-Scheduling algorithms.
15.What is a binary semaphore?
16.Give any two classic problems of synchronization.
17.Write the idea of overlays.
18.Specify the principles followed in first-fit and best-fit allocation strategies.
19.Mention the significance of FIFO page replacement.
20.List the basic file operations.
21.Write the functions of executable and batch files.
22.What is a buffer?
23.What are worms and viruses?
24.Give the significance of non-maskable interrupt. 25. What are the goals of Operating Systems?
26. What is multiprogramming?
27. Write the states of a process.
28. What is race condition?
29. Define deadlock.
30. What is dynamic loading?
31. Give the purpost of compaction.
32. Define 50% rule.
33. What is lazy swapper?
34. Give the solution to thrashing.
35. Differentiate blocking and non-blocking I/O.
36. What is access latency?
PART –B 5 MARKS
List and explain the operating system services.
Give a brief account on virtual machines.
Explain any TWO classic problems of synchronization. . Explain the various methods for handling deadlock. Explain briefly the address binding.
List and explain the various file attributes. Explain the domain structure with an example.
Discuss about mainframe systems.
9.Explain the operating-system services.
10Describe the important aspects in deadlock detection.
11State and explain the readers-writers problem.
12Explain the logical and physical address space.
13Write a note on thrashing.
14Discuss about I/O hardware.
15. List and explain Operating System services.
16. Explain multithreading models.
17.Briefly explain critical section problem.
18. Explain External and Internal fragmentation with example.
19. Write a note on Demand Paging.
20. Discuss the concept of Interrupts.
21. Write a note on file management systems.
PART C — 10 MARKS
1 List and explain any TWO CPU-Scheduling algorithms with examples.
2. Describe in detail, the various algorithms used for deadlock avoidance. 3. Explain the common techniques for structuring the page table
4.List and explain any TWO page replacement algorithms with examples. 5. Discuss about the kernel I/O system in detail.
6. Discuss process scheduling.
7. Discuss about semaphores.
8. Elaborate the importance of paging and segmenatation schemes.
9. Explain the major methods of allocating disk space.
10. Explain in detail multiprocessor and distributed systems.
11. Explain the various CPU scheduling algorithms in detail.
12. Explain the deadlock avoidance with Bankers algorithm.
13. Explain in detail the concept of
segmetation with a neat diagram.
14. Write notes on access matrix and its implementation.

Week 5: Take a free brainbench certification and submit the page showing your p

Week 5:
Take a free brainbench certification and submit the page showing your passed the exam
Choose 3 certifications you would like to acheive before or just slightly after you graduate.
Remember APA title page
Next assignment Week 6- Social Engineering: (SR3)
Scenario/Summary:
Social Engineering is one of the largest threats to information security and company networks. The need to understand how hackers use social engineering and how to prevent or minimize the effects and use, are an important skill for all technology users and creators. Social Engineering can have adverse effects of the social and economic viability of a company or individual. Address the social, economic and environmental impacts of social engineering in your research Deliverables:
Create an Annotated bibliography for 3 articles you have read on Social Engineering. In your annotation insure you include the method of social engineering used and suggest how it might be prevented.
Insure you use the proper APA style for citing your references. Steps
1. Search the Internet or industry journals for articles the following topic: Social Engineering.
2. Submit your annotated bibliography.
3. Choose one of the articles and discuss the physiology behind the Social Engineering in the article and how it impacts society.
Next assignment Week 11:Search the Internet or industry journals for articles the following topic:
Ethical Code of Conduct in IT or CS
Create an Annotated bibliography for 3 articles you have read. Insure you use the proper APA style for citing your references. 1 page
next assignment week 13: Write a 1 page paper about what your career choices will be in the next 5 years. What do you plan to do after college and where you plan to be in 5 years.
With the added info about the field you have learned in this class, what are your plans for the next 5 years. Apa format
Next assignment
Week 14: Search the Internet or industry journals for articles the following topic:
Social Media
Create an Annotated bibliography for 3 articles you have read. Insure you use the proper APA style for citing your references. 1 page

1.Discuss the various computer generations in terms of technology used and give

1.Discuss the various computer generations in terms of technology used and give an example of a computer developed in each generation.
2.Differentiate between system software and application software .
3.Differentiate between a drive, folder and file as used in computers

An Operating System (OS) is a software that acts as an interface between compute

An Operating System (OS) is a software that acts as an interface between computer hardware components and the user. Every computer system must have at least one operating system to run other programs. Applications like Browsers, MS Office, Notepad Games, etc., need some environment to run and perform its tasks.
The OS helps you to communicate with the computer without knowing how to speak the computer’s language. It is not possible for the user to use any computer or mobile device without having an operating system.

Week 5: Take a free brainbench certification and submit the page showing your p

Week 5:
Take a free brainbench certification and submit the page showing your passed the exam
Choose 3 certifications you would like to acheive before or just slightly after you graduate.
Remember APA title page
Next assignment
Week 6- Social Engineering: (SR3)
Scenario/Summary:
Social Engineering is one of the largest threats to information security and company networks. The need to understand how hackers use social engineering and how to prevent or minimize the effects and use, are an important skill for all technology users and creators. Social Engineering can have adverse effects of the social and economic viability of a company or individual. Address the social, economic and environmental impacts of social engineering in your research
Deliverables:
Create an Annotated bibliography for 3 articles you have read on Social Engineering. In your annotation insure you include the method of social engineering used and suggest how it might be prevented.
Insure you use the proper APA style for citing your references.
Steps
1. Search the Internet or industry journals for articles the following topic: Social Engineering.
2. Submit your annotated bibliography.
3. Choose one of the articles and discuss the physiology behind the Social Engineering in the article and how it impacts society.
Next assignment
Week 11:Search the Internet or industry journals for articles the following topic:
Ethical Code of Conduct in IT or CS
Create an Annotated bibliography for 3 articles you have read. Insure you use the proper APA style for citing your references. 1 page
next assignment
week 13: Write a 1 page paper about what your career choices will be in the next 5 years. What do you plan to do after college and where you plan to be in 5 years.
With the added info about the field you have learned in this class, what are your plans for the next 5 years. Apa format
Next assignment
Week 14: Search the Internet or industry journals for articles the following topic:
Social Media
Create an Annotated bibliography for 3 articles you have read. Insure you use the proper APA style for citing your references. 1 page

Hello, I have a research which is a group assignment i have taken the part 1 onl

Hello, I have a research which is a group assignment i have taken the part 1 only. Please read the word document because it has all the requirement and restriction. Do not forget just do the (Title page, Contents, Introduction (8 to 10 lines) And Part 1 ONLY.
Part 1. OS Security
Write a detailed report covering the following OS security topics.
Identify Security Risks and Threats: Conduct a thorough analysis to identify potential security risks and threats associated with the chosen operating system.
Research Security Mechanisms: Study various security mechanisms and techniques relevant to the selected OS for providing security to the system. These may include firewalls, antivirus software, encryption, secure boot processes, access controls, and more.
Propose Security Enhancements: Based on the above topics, investigate the chosen OS’s current security level and suggest how it might be strengthened.

I attached three files (word, pdf, PowerPoint). Read the answer at the word fil

I attached three files (word, pdf, PowerPoint).
Read the answer at the word file and complete the answer that not answered in part 2 :Concrete Design:
Convert your conceptual designs, enriching them with specifics like colors,
auditory cues, graphics, menus, icons, etc. Dive deeper into design nuances as
discussed in Chapters 7 and 12. Employ any visual design software you’re
comfortable with.
and part3 :Complement your prototype with a 2-minute video showcasing its
interactive features.
And at it to the word file and the power point file

Q: Research review for Memory Management in Android / iOS / any other mobile op

Q: Research review for Memory Management in Android / iOS / any other mobile operating system.
Use the following fonts. Times New Roman font with font size of 12 for paragraphs
Times New Roman font with font size of 14 bold for headings
The line spacing should be single.
Paper should not have more than 15% plagiarism.
Avoid grammatical mistakes.
two files for the answer and Presentation
The deliverables of the project should include A report with the following section
o Abstract: summary of chosen problem. (1 Marks)
o Introduction: a brief introduction about the chosen topic. These should be demonstrated using text and diagrams. (2 Marks)
o Background: a brief of the chosen topic (provide any terms or theories the reader should know about). (2 Marks)
o Discussion: discuss the chosen topic thoroughly. (3 Marks)
o Conclusion: summarize the findings of the discussion. (1 Marks)
o References: The citation should follow the APA style. (1 Marks)
o Presentation: From your paper. (4 Marks)
the paper must be 6-8 pages, including references.