Skip to main content

CS609 Current Final Term Fall 2013 File 1



How large file contents can be managed using FAT? 2 marks
• Larger files would be comprised of numerous clusters. • The first Cluster # can be read from FCB for rest of the Cluster, a chain is maintained within the FAT.
Answer in simple words is in green
 As large files would be composed of many clusters the first Cluster number is obtained from FCB and the subsequent clusters can be obtained from FAT by using the previous cluster Number to obtain the next cluster number and so on.

When we talk about FAT32, what is the size of FSInfo block? 2 marks
 On a FAT32 volume, the FAT can be a large data structure, unlike on FAT16 where it is limited to a maximum of 128K worth of sectors and FAT12 where it is limited to a maximum of 6K worth of sectors.
FSInfo block contains information required at the time of allocation/de-allocation to the file. Size of FAT 32 is huge at allocation/de-allocation time so calculating these values is not feasible, therefore these are stored in FSInfo block

Which control information PSP contains? 2 marks
• is situated before the start of a process.
• contains control information like DTA ( Disk Transfer
Area) and command line parameters.

Which is the location of timer count in BIOS data area? 2 Marks

Timer location in BIOS data area is 40:6CH

Explain the purpose of file control block(FCB)? 3 Marks
Control information about files are maintained in a data structure called the File control
block (FCB). The FCB for each file is created and stored in the disk.
We can get information about the file such as size, date time of creation, data time of last modification etc from FCB.  Further we can also impose restrictions on file such as read only, archived etc using FCB

In NTFS, where the backups of boot block are stored and why? 3 Marks
the NTFS "Backup Boot Sector" isn't really part of the NTFS Volume; it's actually stored in a sector immediately following the last sector of the Volume, which makes an NTFS Volume's partition size 1 sector larger than its Volume size!
What are three different kind of computer viruses? 3 Marks
Types of Viruses
• Partition Table Virus
• Boot Sector Virus
·         • File Viruses

Write a C program that should print your name using int 21H with the help of int86 function

See Page#19 for idea solution detail
Idea solution:
                    #include <dos.h>
                    union REGS regs;
                    main()
                    {
                                         regs.h.ah = 0;
                                         regs.h.al = 1;
                                         int86( 0x10, &regs, &regs );
                                         printf("Fourty by Twenty-Five color mode.");
                    }

What will be the impact of placing E5 in place of first character of file name? 5 marks
DOS perform file deletion by placing 0xE5 at the first byte of it FCB entry and placing 0’s (meaning available) in the entries for the file clusters in the FAT.


How partition table virus fools DOS about conventional memory? 5 marks
• DOS uses the conventional memory first 640 KB for its memory management The transient part of Command.Com loads itself such that its last byte is loaded in the last byte of Conventional Memory. If somehow there is some Memory beyond Command.Com’s transient part it will not be accessible by DOS.
• At 40:13H a word contains the amount of KBs in Conventional Memory which is typically 640.
• If the value at 40:13H is somehow reduced to 638 the transient part of Command.Com will load itself such that its last byte is loaded at the last byte of 638KB mark in Conventional RAM.
• In this way last 2KB will be left unused by DOS. This amount of memory is used by the Virus according to its own size.

  
Write down a TSR program, when ever user presses a key it displays it thrice. For example if user has pressed “A” it will display “AAA”? 5 marks

#include <dos.h>
void interrupt (*old)( );
void interrupt newfunc( );
void main( )
{
old = getvect(0x09);
setvect(0x09,newfunc);
keep(0,1000);
}
void interrupt newfunc ( )
{
(*old)( );
(*old)( );
(*old)( );
}
This program simply intercepts the keyboard interrupt and places the address of newint
in the IVT. The newint simply invokes the original interrupt 9 thrice. Therefore the
same character input will be placed in the keyboard buffer thrice i.e three characters will
be received for each character input.

52.Find the root directory sector. Where reserved sector = 1 and sector per FAT = 9. Use appropriate assumption where needed? 5 Marks

Root DIR Sector: reserved sectors +
2 * (size of FAT) = 1 + 2 * 9 = 19

Objective 20 % from moaaz file and subjective 30 %

Q: what is differenc between tracks and sectors:
Q: Write disadvantages and advantages of  FAT32:

Q:How disk scan identify the bad sectors?

Answer:-  • It attempts to write a block. • After write it reads back the block contents. • Performs the CRC test on data read back. • If there is an error then the data on that block is not stable the cluster of that block should be marked bad. • The cluster is marked bad by placing the appropriate code for bad cluster so that they may not be allocated to any file.


Q) Write down a procedure to convert the cluster number into sector number?
Q# Suppose a disk is divided into two partition and we have read MBR at LBA=0 to get information about primary partition a) How many bytes of code part we need to skip to get information about primary partition? b) How many bytes of code part we need to read information?

Q# Write down procedure to convert a cluster number into sector number
Answer:-  NTFS simply the following formula will be used to translate the sector number into cluster number. Sector # = Cluster # * Sector Per Cluster

 Q: In FAT32, what is the size of FSInfo?
Answer:- On a FAT32 volume, the FAT can be a large data structure, unlike on FAT16 where it is limited to a maximum of 128K worth of sectors and FAT12 where it is limited to a maximum of 6K worth of sectors.



Comments

Popular posts from this blog

CS614 Quiz No.4 Shared by Princess (solved), Spring 2014

  “What means What”. The phrase refers to: Select correct option:  Meta data  External data Transformed data Internal representations Question # 2 of 10 Which of the following is NOT one of the activities of “Maintenance and Growth” phase in Kimball’s DWH development approach? Select correct option: Education Technical Education Program Support  Interface Deployment                 Question # 3 of 10 Horizontally wide data means: Select correct option: Dataset has large no. of attributes Dataset has large no. of records Dataset has attribute skews Dataset has partitioning skews                 Question # 4 of 10 Which of the following is NOT one of the top-10 mistakes that should be avoided during DWH development? Select correct option: Not interacting directly with end ...

CS614 Quiz No.4 Shared by MT Khan (Solved)

Question # 1 of 10 ( Start time: 09:04:39 PM ) Total Marks: 1 A typical cycle of implementing the change in DWH comprises of the sequence: Select correct option: Production -> QA -> Development Development-> QA -> Production(CORRECT) Development -> Production -> QA Production -> Development -> QA Question # 2 of 10 ( Start time: 09:05:16 PM ) Total Marks: 1 Vertically wide data means: Select correct option: Dataset has large no. of attributes Dataset has large no. of records(CORRECT) Dataset has attribute skews Dataset has partitioning skews Question # 3 of 10 ( Start time: 09:05:43 PM ) Total Marks: 1 In ___________ phase of kimballs approach, we identify the components needed now and in future. Select correct option: Requirement definition Architectural design Product development Analytical application development Question # 4 of 10 ( Start time: 09:06:56 PM ) Total Marks: 1 Technical architecture design supports the communicat...

CS301 Current Finalterm Paper Spring 2014 Shared By M. Waleed

My Tday's Cs301 Paper: Mcq's Are From Moaz And Some Are From Handouts. Subjective Is From Moaz Majority One. 1- The Image Segmentation Define? 2- The Maximum Number Level Of Nodes In Binary Tree 3-The Iteration Array Have To Sort. 4- The Hapified Array Have To Solved 5- The Algorithm Of Binary Seaoh Tree 6-Sara Arrays Wala He Tha Ya Heap Wala. 7-....Wala Wala Wala...