Basic CS-Operating System [3i Infotech Placement]: Sample Questions 18 - 19 of 89

Glide to success with Doorsteptutor material for competitive exams : get questions, notes, tests, video lectures and more- for all subjects of your exam.

Question 18

Operating System
Edit

Describe in Detail

Essay▾

Define disk swapping and file system swapping?

Explanation

Swap File in Figure

Disk swapping vs. file system swapping

Disk swapping:

  • The practice of inserting and removing, or swapping, floppy disks in a floppy disk drive-based computer system.
  • Allows running the program not loaded into memory- first remove the data disk, then insert the program disk.
  • Disk swapping inconvenient feature of early Macintosh 128K systems to save RAM.

File system swapping:

  • A space on a hard disk used as the virtual memory extension of a computer՚s real memory.
  • A swap file allows computer՚s operating system to allocate more RAM than actually present in computer.
  • Operating system move memory from swap file to RAM in units called pages and the process is called paging.

Question 19

Operating System
Edit

Describe in Detail

Essay▾

What level of security does windows NT meets?

Explanation

  • Level of security.
  • security standard originally required for deployment in government organizations- now commercial organizations demand same level of security.
  • Main Requirements for Compliance

    • User identification and authentication:
      • A user proves their identity.
      • For example, providing user-id/password combination.
    • Discretionary access control:
      • Access control for every object within the system- printer, files and process access at various levels of granularity.
    • Auditing Capabilities:
      • System provides the ability to log all user action and object access with enough information for identifying the user who performed the operation.
    • Safe object reuse:
      • System guarantees that any discarded objects cannot be accessed by other entities.
    • System integrity:
      • System must protect resources belonging to one entity, from interfering with another entity.

Developed by: