QUOTE

welcome

welcome to our college social blog
we have lot of information about our college fest and events etc
all of our college members join in this site .
to add to this blog
click on follow then select google
after that log in with your gmail id
thank you
KARTHIK REDDY.

Friday, March 25, 2011

OS 2 MID

1.A.EXPLAIN CRITICAL SECTION PROBLEM IN DETAIL
   B.EXPLAIN THE CONCEPT OF SEMAPHORES
2.A.EXPLAIN THE SYSTEM MODEL USING DEADLOCKS
   B.EXPLAIN METHODS THAT CAN PREVENT A DEADLOCK
3.A.EXPLAIN PAGING AND SEGMENTATION?
   B.WHAT IS A FILE AND WHAT ARE THE VARIOUS ACCESS METHODS IN A FILE.
4.A.EXPLAIN ABOUT RAID STRUCTURE
   B.EXPLAIN PAGE-REPLACEMENT ALGORITHMS
5.EXPLAIN GOALS OF PROTECTION &PRINCIPLES OF PROTECTION
6.EXPLAIN FIREWALLING TO PROTECT SYSTEMS AND NETWORKS.

OOAD


1.(a)Define a usecase?what are its common properties,contents and uses?
  (b)List out the various steps involved in modeling the content of a system?

2.What is a state?what are the several parts of a state?Enumerate the steps to model a family of signals?

3.Write about swimalanes in activity diagrams?

4.Explain briefly about the following terms:
  (i)Action states and activity states
  (ii)Transitions
  (iii)Branching.

5.(a)What are the common properties,contents and uses of the component diagrams?
  (b)Enumerate the steps to model source code and API?

6.Explain briefly about the following terms:
  (i)Signals
  (ii)Time and change events
  (iii)Call events
  (iv)Sending and receiving events.

JNTU WORLD

Add This Transparent Notification Bar To Your Blog Transparent Notification Bar

X