Mcqs were
from moaaz file
subjective:
1.
calculate the sector # for following cluster 44H. we have following information
block per cluster=8 first user block no is =20.................... 2 marks
2.
ntfs store file name in ____________ and fat store file name in __________
characters? .... 2 marks
3.
what is paging in context of non contigious memory system? ...... 2 marks
4.
what type of operations performed by system software ? ........... 2 marks
5.
what is usage of cd. and cd.. 3 marks
6.
three different types of computer virus?.......... 3 marks
7.
what is difference in physical and logical view of file ? .......... 3 marks
8.
discuss all the step performed by following c statement
unsigned
int far *lpt= (unsigned int far *)0x00400008;
outport((*lpt+2),
inport (*lpt+2)|0x10;
outport
(0x21, inport(0x21)|0x80).................... 3 marks
9.
how communication of modem can be improved in term of data transfer?..........
5 marks
10.
how can a certain volume with moderate space and another volume with large
space can be managed by same fat system ?................. 5 marks
11.
how disk partitioning software works? ............. 5 marks
12.
how can we recover the deleted content of file ? explain each step of recovery
....... 5 marks
How large file contents can be managed using FAT? 2 marks
• Larger files would be comprised of numerous clusters. •
The first Cluster # can be read from FCB for rest of the Cluster, a chain is
maintained within the FAT.
|
Answer
in simple words is in green
As
large files would be composed of many clusters the first Cluster number is
obtained from FCB and the subsequent clusters can be obtained from FAT by using
the previous cluster Number to obtain the next cluster number and so on.
When we talk about FAT32, what is the size of
FSInfo block? 2 marks
On a FAT32 volume, the FAT can be a large data
structure, unlike on FAT16 where it is limited to a maximum of 128K worth of
sectors and FAT12 where it is limited to a maximum of 6K worth of sectors.
|
FSInfo
block contains information required at the time of allocation/de-allocation to
the file. Size of FAT 32 is huge at allocation/de-allocation time so
calculating these values is not feasible, therefore these are stored in FSInfo
block
Which control information PSP contains? 2 marks
•
is situated before the start of a process.
•
contains control information like DTA ( Disk Transfer
Area)
and command line parameters.
Which is the location of timer count in BIOS data area? 2 Marks
Timer
location in BIOS data area is 40:6CH
Explain the purpose of file control block(FCB)? 3 Marks
Control
information about files are maintained in a data structure called the File
control
block
(FCB). The FCB for each file is created and stored in the disk.
We
can get information about the file such as size, date time of creation, data
time of last modification etc from FCB. Further we can also impose
restrictions on file such as read only, archived etc using FCB
In NTFS, where the backups of boot block are stored and why? 3
Marks
the NTFS "Backup Boot Sector" isn't really part of the NTFS Volume;
it's actually stored in a sector immediately following the last sector of the
Volume, which makes an NTFS Volume's partition size 1 sector larger than its
Volume size!
What are three different kind of computer viruses? 3 Marks
Types
of Viruses
•
Partition Table Virus
•
Boot Sector Virus
• File Viruses
Write a C program that should print your name using int 21H with
the help of int86 function
See
Page#19 for idea solution detail
Idea
solution:
#include <dos.h>
union REGS regs;
main()
{
regs.h.ah = 0;
regs.h.al = 1;
int86( 0x10, ®s, ®s );
printf("Fourty by Twenty-Five color mode.");
}
What will be the impact of placing E5 in place
of first character of file name? 5 marks
DOS perform file deletion by placing 0xE5 at the first
byte of it FCB entry and placing 0’s (meaning available) in the entries for
the file clusters in the FAT.
|
How partition table virus fools DOS about conventional memory? 5
marks
•
DOS uses the conventional memory first 640 KB for its memory management The
transient part of Command.Com loads itself such that its last byte is loaded in
the last byte of Conventional Memory. If somehow there is some Memory beyond
Command.Com’s transient part it will not be accessible by DOS.
•
At 40:13H a word contains the amount of KBs in Conventional Memory which is
typically 640.
•
If the value at 40:13H is somehow reduced to 638 the transient part of
Command.Com will load itself such that its last byte is loaded at the last byte
of 638KB mark in Conventional RAM.
•
In this way last 2KB will be left unused by DOS. This amount of memory is used
by the Virus according to its own size.
Write down a TSR program, when ever user presses a key it displays
it thrice. For example if user has pressed “A” it will display “AAA”? 5 marks
#include
<dos.h>
void
interrupt (*old)( );
void
interrupt newfunc( );
void
main( )
{
old
= getvect(0x09);
setvect(0x09,newfunc);
keep(0,1000);
}
void
interrupt newfunc ( )
{
(*old)(
);
(*old)(
);
(*old)(
);
}
This
program simply intercepts the keyboard interrupt and places the address of
newint
in
the IVT. The newint simply invokes the original interrupt 9 thrice. Therefore
the
same
character input will be placed in the keyboard buffer thrice i.e three
characters will
be
received for each character input.
52.Find the root directory sector. Where reserved sector = 1 and
sector per FAT = 9. Use appropriate assumption where needed? 5 Marks
Root
DIR Sector: reserved sectors +
2
* (size of FAT) = 1 + 2 * 9 = 19
Comments
Post a Comment
Please give us your feedback & help us to improve this site.