SECTION-A
INTRODUCTION: - Machine Hardware (Traps and Interrupts, Multimode Execution), Operating
System Structure (Operating System Types, Operating System Kernel, the Boot Process).
PROCESS MANAGEMENT :- Process Scheduling, Process State, Scheduling Criteria, Scheduling
Algorithms (First-Come First-Served, Shortest Job First, Shortest Remaining Time, Round Robin,
Priority, Multilevel feedback Queues) (10)
SECTION-B
INTERPROCESS COMMUNICATION AND SYNCHRONIZATION: - Interprocess Communication,
Process Synchronization (Critical Section, Interrupt Disabling, Test and Set Instruction, Write a
Program Instruction, Wait and Signal, Semaphores) Deadlock (Deadlock Prevention, Deadlock
Avoidance, Deadlock Detection, Recovery from Deadlock). MEMORY MANAGEMENT: - Single
Absolute Partition, Single Relocatable Partition, Multiprogramming, and Multiple Partitions
(Multiple Fixed Partitions, Multiple Variable Partitions (Partition Selection Algorithms), Paging,
Segmentation, Segmentation with Paging, Page and Segment Tables (Associative Memory,
Inverted Page Table. (12)
SECTION-C
VIRTUAL MEMORY: - Demand Paging (Locality of Reference, Page Locking, Page Size, Page
Replacement Algorithms, Algorithm Performance, Allocation Policies, Working Set), FILE SYSTEM
MANAGEMENT: - Directories and Names (Partitions, Per-Process Root Directory, Directory
Structure, Directory Entries), Types of File System Objects, File System Functions, Information
Types, File System Architecture (Access Methods, Access Control, File Locking, Blocking,
Allocation, Free Space). (12)
SECTION-D
DEVICE MANAGEMENT :- Hardware I/O Organization (I/O Control, Port and Memory-Mapped I/O,
Module Registers, Busy Wait I/O, Polled I/O, Interrupt I/O, Direct Memory Access (DMA)),
Software Organization (Network I/O, Logical I/O, Buffering, Caching, Device Drivers), Devices
(Graphics, Text-Based Displays, Storage Disks, Hard-Disk Performance, Hard-Disk Scheduling,
Formatting, Raid, RAM Disks). SECURITY: - Authentication (Passwords, Physical Authentication),
Prevention, Detection, Correction, Identification, Threat Categories, Program Threats. (10)