Q1. What do you mean by thrashing? Describe the concept of Working set Window with the help of illustration.
Q2. What do you mean by SCAN algorithm for the disk scheduling?
Q3. State the three merits of placing functionality in a device controller instead of the kernel. State the three demerits.
Q4. How security can be accomplished by using Authentication? Describe MAC (Message Authenticate Code).
Q5. Illustrate the use of Access Matrix to protect the resources? Describe its implementation.
Q6. The demerits of multithreaded programming can be broken down to four major categories. Discuss them in brief.