Faculty of Computing and Informatics, Department of Computer Science
SAD622S: 2nd Opportunity Examination
1. Briefly explain the subject terms below:
(a) Fi le
(2)
(b) Process
(2)
(c) Kernel
(2)
(d) lnode
(2)
(e) Driver
(2)
2. Give an example of the following concepts (1 mark each] and explain how the example
that you have given, works. (2 marks each]
(a) Inter-process communication
(3)
(b) Delegation of authority
(3)
(c) Filesystem
(3)
3. A user who has operated a scanner on an MS Windows computer decides to change
(3)
to the Linux operating system. Here, the scanner is not working, and an onl ine help
forum advises to download a Linux driver for the scanner.
Briefly explain why the Windows driver cannot be re-used, even though it is the same
scanner that is being used.
4. A RAID 4 array of three disks is given (block striping, 2 data disks, 1 parity disk). Block
(3)
1 on data disk 1 starts with :
100111010 ... . . . .
Block 1 on the parity disk starts with
101010101 . .. .. . .
Data disk 2 has crashed and was replaced by an empty disk. How w ill the data on disk
2 be restored, and what are the first 8 bits in block 1 of disk 2? Explain briefly (1 mark)
and show your calculations (2 marks].
5. Compare and contrastthe POSIX"write" permission and the MS Windows "read-only"
file attribute.
Assume that file A. txt on a Linux operating system has no "write" permissions set for
anyone, and that file B. txt on an MS Windows operating system has the "read-only"
attribute set.
(a) List one similarity that applies both to file A. txt and file B. txt.
(1)
(b) What can be done to allow user Charlie to delete fi le A. txt? Be specific and
(2)
mention all steps. One possibility is sufficient.
(c) What can be done to allow user Charlie to delete file B. txt? Be specific and
(2)
mention all steps. One possibility is sufficient.
Page 2 of 4