What is purpose of system call? State two system calls with their functions.

1 Answer

Answer :

System call provides an interface between a running program and operating system. It allows user to access services provided by operating system. This system calls are procedures written using C, C++ and assembly language instructions. Each operating system has its own name for each system call. Each system call is associated with a number that identifies itself.

System calls:

Process Control: Program in execution is a process. A process to be executed must be loaded in main memory. while executing it may need to wait, terminate or create & terminate child processes.

 end, abort

 load, execute

 create process, terminate process

 get process attributes, set process attributes

 wait for time

 wait event, signal event

 allocate and free memory

File Management: System allows us to create and delete files. For create and delete operation system call requires the name of the file and other attributes of the file. File attributes include file type, file size, protection codes, accounting information and so on. Systems access these attributes for performing operations on file and directories. Once the file is created, we can open it and use it. System also allows performing reading, writing or repositioning operations on file.

 create file, delete file

 open, close

 read, write, reposition

 get file attributes, set device attributes

 logically attach or detach devices

3. Device Management: When a process is in running state, it requires several resources to execute. These resources include main memory, disk drives, files and so on. If the resource is available, it is assigned to the process. Once the resource is allocated to the process, process can read, write and reposition the device.

 request device, release device

 read, write, reposition

 get device attributes, set device attributes

 logically attach or detach devices

4. Information Maintenance: Transferring information between the user program and the operating system requires system call. System information includes displaying current date and time, the number of current user, the version number of the operating system, the amount of free memory or disk space and so on. Operating system keeps information about all its processes that can be accessed with system calls such as get process attributes and set process attributes.

 get time or date, set time or date

 get system data, set system data

 get process, file, or devices attributes

 set process, file, or devices attributes

5. Communication: Processes in the system, communicate with each other. Communication is done by using two models: message passing and shared memory. For transferring messages, sender process connects itself to receiving process by specifying receiving process name or identity. Once the communication is over system close the connection between communicating processes.

 create, delete communication connection

 send, receive messages

 transfer status information

 attach or detach remote devices. 

Related questions

Description : State and describe types of scheduler.

Last Answer : There are three types of scheduler: Long term scheduler Short term scheduler Medium term scheduler 1. Long term scheduler: It selects programs from job pool and loads them into the ... scheduler works in close communication with long term scheduler for loading process into the main memory. 

Description : Draw process state diagram.

Last Answer : process state diagram

Description : Enlist the operating system tools. Explain any two in detail.

Last Answer : Following are the operating tools: User Management Security policy Device Management Performance Monitor Task Scheduler A) User management: User management includes everything ... routing tables, interface statistics, masquerade connections, and multicast memberships. # netstat -tulpn

Description : List any four features of open source operating system.

Last Answer : 1. Open Source: open source OS code is freely available and it is community based development project. Multiple team's works in collaboration to enhance the capability of operating system and it is ... issuing a command in Linux Terminal or Shell. Linux can also run Windows applications if needed.

Description : Enlist types of operating system. Explain multiprogramming OS in detail.

Last Answer : Types of operating system 1.Batch Systems 2.Multiprogramming 3.Multitasking 4.Time-Sharing Systems 5.Desktop Systems 6.Distributed system 7.Clustered system 8.Real Time system: Multiprogramming ... multiprogramming: user can open word, excel, access and other applications in a system.

Description : Define real time operating system. List its any four applications of it.

Last Answer : Real time Operating System: A real time system has well defined fixed time constraints. Processing should be done within the defined constraints -Hard and Soft real time system. OR The ... Applications: 1. Flight Control System 2. Simulations 3. Industrial control 4. Military applications

Description : Enlist different file allocation methods? Explain contiguous allocation method in detail.

Last Answer : From the user's point of view, a file is an abstract data type. It can be created, opened, written, read, closed and deleted without any real concern for its implementation. The implementation of a ... a times is difficult to estimate. 4. Compaction may be required and it can be very expensive.

Description : List free space management techniques? Describe any one in detail.

Last Answer : A file system is responsible to allocate the free blocks to the file therefore it has to keep track of all the free blocks present in the disk. There are mainly four approaches by using which, the free ... block. This block contains a pointer to the next free disk block, and so on.

Description : Explain LRU page replacement algorithm for following reference string. 7 0 1 2 0 3 0 4 2 3 0 3 2 1 2 0 1 7 0 1 Calculate the page fault.

Last Answer : LRU: The Least Recently Used (LRU) page replacement policy replaces the page that has not been used for the longest period of time. LRU replacement associates with each page the time of that page's last use. ... in question so assume frame size as 3 or 4) LRU: Assume frame size=3

Description : Explain multithreading model in detail.

Last Answer : Many systems provide support for both user and kernel threads, resulting in different multithreading models. Following are three multithreading model: Many-to-One Model The many-to- ... True concurrency cannot be achieved. Multiple threads of kernel is an overhead for operating system

Description : Explain PCB with diagram.

Last Answer : Each process is represented as a process control block (PCB) in the operating system. It contains information associated with specific process. Process State: It indicates current state of a process. ... . Each PCB gives information about a particular process for which it is designed.

Description : Explain Round Robin algorithm with suitable example.

Last Answer : It is preemptive scheduling algorithm. A small unit of time known as a time quantum or time slice is used for pre-emption of a currently running process. Ready queue is implemented as a circular ... has received 1 time quantum, the CPU returns to process P1 for an additional time quantum. 

Description : Write Unix command for following: i)create a folder OSY ii) create a file FIRST in OSY folder iii) List/display all files and directories. iv) Write command to clear the screen

Last Answer : i) create a folder OSY: $mkdir OSY ii)create a file FIRST in OSY folder: $cd OSY $cat>FIRST or $ touch FIRST iii) List/display all files and directories: $ls iv) to clear screen: $clear

Description : Describe sequential and direct access method.

Last Answer : Sequential access: Information from the file is processed in order i.e. one record after another. It is commonly used access mode. For example, editors and compilers access files in sequence. A read ... prevent the user from accessing portions of the file system that may not be part of his file.

Description : Explain partitioning and its types.

Last Answer : An important operation of memory management is to bring programs into main memory for execution by the processor. Partitioning is a technique that divides a memory into multiple partitions. These partitions ... in memory. For example: Consider following table with process and memory space.

Description : Explain deadlock? What are necessary conditions for deadlock?

Last Answer : In multiprogramming environment, several processes may compete for a finite number of resources. A process requests resources and if the resources are not available then the process enters into the ... Each process is waiting for the resources held by other waiting processes in circular form.

Description : Describe I/O Burst and CPU Burst cycle with neat diagram.

Last Answer : CPU burst cycle: It is a time period when process is busy with CPU.  I/O burst cycle: It is a time period when process is busy in working with I/O resources. A process execution consists ... cycle and so on. The final CPU burst cycle ends with a system request to terminate execution.

Description : With neat diagram explain inter process communication model.

Last Answer : Inter-process communication: Cooperating processes require an Interprocess communication (IPC) mechanism that will allow them to exchange data and information. There are two models of IPC 1. ... a communication link between them. Between each pair of processes exactly one communication link.

Description : List components of OS. Explain process management in detail.

Last Answer : List of System Components: 1. Process management 2. Main memory management 3. File management 4. I/O system management 5. Secondary storage management Process Management: The operating ... synchronization. 4. A mechanism for process communication. 5. A mechanism for deadlock handling.

Description : Describe any four file attributes

Last Answer : File attributes: Name: The symbolic file name is the only information kept in human readable form. Identifier: File system gives a unique tag or number that identifies file within file ... Last modification and last use. These data can be useful for protection, security and usage monitoring.

Description : Write syntax for following commands: i)Sleep ii)Kill

Last Answer : i)sleep Syntax: sleep NUMBER[SUFFIX]… sleep OPTION ii) kill Syntax: kill pid

Description : Define virtual memory

Last Answer : Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer to compensate for physical memory shortages by temporarily transferring data ... can be placed in overlays, but can concentrate instead on the problem to be programmed. 

Description : Explain any four scheduling criteria.

Last Answer : 1. CPU utilization: In multiprogramming the main objective is to keep CPU as busy as possible. CPU utilization can range from 0 to 100 percent. 2.Throughput: It is the number of processes ... fairly early and can continue computing new results while previous results are being output to the user.

Description : Explain any 4 services provided by OS.

Last Answer : 1.User Interface: All operating systems have a user interface that allows users to communicate with the system. Three types of user interfaces are available: a. Command line interface ( ... to system resources. Security is provided by user authentication such as password for accessing information.

Description : At the meeting with Kim Jung Un, Trump calls him “my friend “. Isn’t this a slap in America’s face to call a tyrant a friend?

Last Answer : In Trumpworld, friends are enemies, enemies are friends, murderers are allies, up is down and red is blue. Trump doesn’t know what America stands for.

Description : Were you aware that many call center calls were handled by prisoners?

Last Answer : answer:no personal information is displayed to the prisoners, who don't have access to computers, officials said. So, they're not taking over-the-phone payments. It appears, from what I've read, ... , when there are non-prisoners who would be willing to take those jobs for a reasonable pay rate.

Description : I have a friend who calls a motor grader a "blade." What do you call it?

Last Answer : I’ve heard it called that by Operating Engineers. They have their own terms for lots of equipment. And it depends on whether the blade is pushed or pulled. But that’s about the extent of my knowledge.

Description : Creepiness. Microsoft operating systems doesn't have a support center somewhere in India that calls you first, do they? Should I call trace him or just blow it off? Where did he get my number?

Last Answer : answer:It is a scam to get you to install shit. http://arstechnica.com/tech-policy/2012/10/i-am-calling-you-from-windows-a-tech-support-scammer-dials-ars-technica/

Description : How come every time my boyfriend says he'll call me right back, he calls like 4 hrs later?

Last Answer : Ugh. Some people are just like that. My ex ALWAYS forgot to call me. Leave him a text or something asking, “Are you alive?” or something to get a response out of him.

Description : Guys, do you recognize booty call text messages/calls?

Last Answer : I havent gotten any

Description : I want the name of the site or app that can be used to create video and audio call apps There are video calls and audio calls at the same time. Like Emu , Messenger etc. Without coding.

Last Answer : It is not so easy. If you want to create apps, you have to create your own server , not just apps . You can create telegram apps from the project. But the configuration created by the server. Can you do coding , IP tunneling etc. ? You go to the telegram project and you will find the issues there

Description : I don't think the opinions agree, do they?

Last Answer : Praise whenever he returns. The owner of the dog should be punished . He was not consistent in his initial training in his youth and failed to summon training. The dog can't do it. He only does what he was taught.

Description : blocked mobile

Last Answer : You will go to a mobile repair shop;) he will unblock your mobile phone :)

Description : If a priest calls a man 'son', what does he call a woman?

Last Answer : Answers is the place to go to get the answers you need and to ask the questions you want

Description : A company can forfeit shares if the– (A) shareholder fails to pay the amount of the call during the stipulated time (B) shareholder pays calls in advance (C) shareholder does not pay the application money (D) shares have been issued at par

Last Answer : Answer: shareholder fails to pay the amount of the call during the stipulated time

Description : A call means 1. calling on friends 2. calling on bank employees 3. calling on prospective customers 4. to make telephone calls 5. calling on relatives

Last Answer : calling on prospective customers

Description : Native – protocol pure Java converts ……….. into the ………… used by DBMSs directly. A) JDBC calls, network protocol B) ODBC class, network protocol C) ODBC class, user call D) JDBC calls, user call

Last Answer : A) JDBC calls, network protocol

Description : What purpose does FeCl3 serve in the electrophilic aromatic substitution reaction between chlorine and benzene? (a) It serves as a radical initiator to produce the chlorine radical needed to propagate the ... by reacting with the Cl2 and thereby activates it toward attack by benzene's π electrons.

Last Answer : It serves as a Lewis acid catalyst by reacting with the Cl2 and thereby activates it toward attack by benzene’s π electrons.

Description : SPC is used for (A) Carrying Exchange Control Functions (B) Carrying Subscriber Control Functions (C) Exchange Hardware (D) Signalling Purpose

Last Answer : (A) Carrying Exchange Control Functions

Description : Describe the functions of General purpose registers of 8086 microprocessor.

Last Answer : (i) General Purpose Registers of 8086 1. AX (Accumulator) - Used to store the result for arithmetic / logical operations All I/O data transfer using IN & OUT instructions use A ... Index - acts as the destination for string movement instructions Used to hold offset address of Extra segment.

Description : The writ of Prohibition is issued by a superior court - (1) to prevent an inferior court or tribunal from exceeding its jurisdiction or acting contrary to the rules of natural justice (2) to an ... the office (4) to an authority to produce an illegally detained person before the court for trial.

Last Answer : (1) to prevent an inferior court or tribunal from exceeding its jurisdiction or acting contrary to the rules of natural justice Explanation: The writ of Prohibition is an order from a superior ... because the lower court does not have proper jurisdiction to hear or determine the matters before it.

Description : What makes people think their phone calls are private when they talk outdoors?

Last Answer : I’m not sure, but I think it may be related to some people not realizing the glass of their car windows is clear from both sides. There is a ven diagram in the making here.

Description : How do you conceptualize and recognize fellow jellies? Is it their identifying markings? Their distinctive calls? What role does scent marking play?

Last Answer : By user name and, sometimes, avatar.

Description : Do you screen your calls? And, is there anyone in particular that you decide whether or not you're going to pick up their calls, depending on your mood?

Last Answer : I refuse to answer the phone any time I see “Sales Dept” on the caller id.

Description : On the iPhone is there a way to block a caller, so you dont recieve their calls?

Last Answer : answer:download or make the ringer called “silent”, assign the ringer to their name, when a call from them comes in you wont hear a thing. http://www.maclife.com/article/blogs/create_silent_ringtone_iphone

Description : Has anyone else had problems recieving phone calls from certain numbers on their Iphone?

Last Answer : answer:Can you describe what is happening? The only time I have had a problem is if someone tries to call me while I am doing something that uses Edge because I'm away from a WiFi connection (which is rare, ... .. the caller tells me that they don't hear a ring or get voicemail, it is just dead air.

Description : Is anyone getting telephone calls to extend their car warranty?

Last Answer : It is constant! I can’t figure out why they do it. My car has 120,000 miles on it.

Description : How does what Bradford calls and ldquothe first foundation of their government in this place and establish a Puritan community from the beginning as one that excludes strangers?

Last Answer : Feel Free to Answer

Description : What kind of software do telemarketing firms use to keep track of their calls?

Last Answer : There are several softwares available by telemarketing firms to keep track of their calls. There are several call tracking software. Telemarketing firms usually use some sort of call center software ... available call center software progrms here: http://www.capterra.com/call-center-software.