Skip to main content

CS609 Current Final Term Fall 2013 File 8



Mcqs were from moaaz file 
subjective:
1. calculate the sector # for following cluster 44H. we have following information block per cluster=8 first user block no is =20.................... 2 marks
2. ntfs store file name in ____________ and fat store file name in __________ characters? .... 2 marks
3. what is paging in context of non contigious memory system? ...... 2 marks
4. what type of operations performed by system software ? ........... 2 marks
5. what is usage of cd. and cd..      3 marks
6. three different types of computer virus?.......... 3 marks
7. what is difference in physical and logical view of file ? .......... 3 marks
8. discuss all the step performed by following c statement 
unsigned int far *lpt= (unsigned int far *)0x00400008;
outport((*lpt+2), inport (*lpt+2)|0x10;
outport (0x21, inport(0x21)|0x80).................... 3 marks
9. how communication of modem can be improved in term of data transfer?.......... 5 marks 
10. how can a certain volume with moderate space and another volume with large space can be managed by same fat system ?................. 5 marks
11. how disk partitioning software works? ............. 5 marks
12. how can we recover the deleted content of file ? explain each step of recovery ....... 5 marks 


How large file contents can be managed using FAT? 2 marks
• Larger files would be comprised of numerous clusters. • The first Cluster # can be read from FCB for rest of the Cluster, a chain is maintained within the FAT.
Answer in simple words is in green
 As large files would be composed of many clusters the first Cluster number is obtained from FCB and the subsequent clusters can be obtained from FAT by using the previous cluster Number to obtain the next cluster number and so on.

When we talk about FAT32, what is the size of FSInfo block? 2 marks
 On a FAT32 volume, the FAT can be a large data structure, unlike on FAT16 where it is limited to a maximum of 128K worth of sectors and FAT12 where it is limited to a maximum of 6K worth of sectors.
FSInfo block contains information required at the time of allocation/de-allocation to the file. Size of FAT 32 is huge at allocation/de-allocation time so calculating these values is not feasible, therefore these are stored in FSInfo block

Which control information PSP contains? 2 marks
• is situated before the start of a process.
• contains control information like DTA ( Disk Transfer
Area) and command line parameters.

Which is the location of timer count in BIOS data area? 2 Marks
Timer location in BIOS data area is 40:6CH

Explain the purpose of file control block(FCB)? 3 Marks
Control information about files are maintained in a data structure called the File control
block (FCB). The FCB for each file is created and stored in the disk.
We can get information about the file such as size, date time of creation, data time of last modification etc from FCB.  Further we can also impose restrictions on file such as read only, archived etc using FCB

In NTFS, where the backups of boot block are stored and why? 3 Marks
the NTFS "Backup Boot Sector" isn't really part of the NTFS Volume; it's actually stored in a sector immediately following the last sector of the Volume, which makes an NTFS Volume's partition size 1 sector larger than its Volume size!
What are three different kind of computer viruses? 3 Marks
Types of Viruses
• Partition Table Virus
• Boot Sector Virus
• File Viruses

Write a C program that should print your name using int 21H with the help of int86 function

See Page#19 for idea solution detail
Idea solution:
                    #include <dos.h>
                    union REGS regs;
                    main()
                    {
                                         regs.h.ah = 0;
                                         regs.h.al = 1;
                                         int86( 0x10, &regs, &regs );
                                         printf("Fourty by Twenty-Five color mode.");
                    }

What will be the impact of placing E5 in place of first character of file name? 5 marks
DOS perform file deletion by placing 0xE5 at the first byte of it FCB entry and placing 0’s (meaning available) in the entries for the file clusters in the FAT.


How partition table virus fools DOS about conventional memory? 5 marks
• DOS uses the conventional memory first 640 KB for its memory management The transient part of Command.Com loads itself such that its last byte is loaded in the last byte of Conventional Memory. If somehow there is some Memory beyond Command.Com’s transient part it will not be accessible by DOS.
• At 40:13H a word contains the amount of KBs in Conventional Memory which is typically 640.
• If the value at 40:13H is somehow reduced to 638 the transient part of Command.Com will load itself such that its last byte is loaded at the last byte of 638KB mark in Conventional RAM.
• In this way last 2KB will be left unused by DOS. This amount of memory is used by the Virus according to its own size.

 Write down a TSR program, when ever user presses a key it displays it thrice. For example if user has pressed “A” it will display “AAA”? 5 marks

#include <dos.h>
void interrupt (*old)( );
void interrupt newfunc( );
void main( )
{
old = getvect(0x09);
setvect(0x09,newfunc);
keep(0,1000);
}
void interrupt newfunc ( )
{
(*old)( );
(*old)( );
(*old)( );
}
This program simply intercepts the keyboard interrupt and places the address of newint
in the IVT. The newint simply invokes the original interrupt 9 thrice. Therefore the
same character input will be placed in the keyboard buffer thrice i.e three characters will
be received for each character input.

52.Find the root directory sector. Where reserved sector = 1 and sector per FAT = 9. Use appropriate assumption where needed? 5 Marks

Root DIR Sector: reserved sectors +
2 * (size of FAT) = 1 + 2 * 9 = 19


Comments

Popular posts from this blog

CS614 Quiz No.4 Shared by Princess (solved), Spring 2014

  “What means What”. The phrase refers to: Select correct option:  Meta data  External data Transformed data Internal representations Question # 2 of 10 Which of the following is NOT one of the activities of “Maintenance and Growth” phase in Kimball’s DWH development approach? Select correct option: Education Technical Education Program Support  Interface Deployment                 Question # 3 of 10 Horizontally wide data means: Select correct option: Dataset has large no. of attributes Dataset has large no. of records Dataset has attribute skews Dataset has partitioning skews                 Question # 4 of 10 Which of the following is NOT one of the top-10 mistakes that should be avoided during DWH development? Select correct option: Not interacting directly with end user Not being an accommodating person Isolating IT support people from business users Training the users with dummy data and considering it success             

CS614 Quiz No.4 Shared by MT Khan (Solved)

Question # 1 of 10 ( Start time: 09:04:39 PM ) Total Marks: 1 A typical cycle of implementing the change in DWH comprises of the sequence: Select correct option: Production -> QA -> Development Development-> QA -> Production(CORRECT) Development -> Production -> QA Production -> Development -> QA Question # 2 of 10 ( Start time: 09:05:16 PM ) Total Marks: 1 Vertically wide data means: Select correct option: Dataset has large no. of attributes Dataset has large no. of records(CORRECT) Dataset has attribute skews Dataset has partitioning skews Question # 3 of 10 ( Start time: 09:05:43 PM ) Total Marks: 1 In ___________ phase of kimballs approach, we identify the components needed now and in future. Select correct option: Requirement definition Architectural design Product development Analytical application development Question # 4 of 10 ( Start time: 09:06:56 PM ) Total Marks: 1 Technical architecture design supports the communicat

CS301 Quiz No.2 Shared by Tayyeba

Binary search algorithm can not be applied to ____ Select correct option: sorted linked list sorted binary trees        ok sorted linear array pointer array During in-order traversal using recursive calls, if we found a node is NULL. It means this node will satisfy following condition. Select correct option: It will not have left child        ok It will not have right child It will not have both left and right children None of given options Identify the data structure which allows deletions at both ends of the list but insertion at only one end. Select correct option: Input-restricted deque Output-restricted deque Priority queues        ok A BST generated from the data in ascending order is ____________. Select correct option: Linear Nonlinear Balanced        ok Un sorted In a program a reference variable, say x, can be declared as Select correct option: int &x ;        ok int *x ; int x ; None of the given options he depth of a complete bina