👁️ 168 views

Department of Computer Science and Engineering

1st Mid Exam

Course Title: System Programming (CSE-4105)

Semester: 7th | Session: 18-19

Time: 60 minutes | Marks: 10.00

1.


1)

Write short notes:   i) System Programming   ii) Unix Kernel API   iii) Shell Scripting   iv) File Attributes
 

Please SUBSCRIBE to view full question

Topics: N/A Solution is Coming!
2 Marks
2)

Depict the top of a typical UNIX directory hierarchy. How does 1s.-1 work? Explain.

Please SUBSCRIBE to view full question

Topics: N/A Solution is Coming!
2 Marks
3)

Each user has a username and a number, the UID, why? Wouldn't it be simpler to record the username of the user as the owner of a file? Why not have a single identifier for each user?

Please SUBSCRIBE to view full question

Topics: N/A Solution is Coming!
2 Marks
4)

Depict the control flow of system calls. Do you agree/disagree that the system calls are time consuming? Give your statement. How do you change file permissions in Unix Explain with example.

Please SUBSCRIBE to view full question

Topics: File Management , File Permissions , System Calls Solution is Coming!
2 Marks
5)

The hypothetical machine of Fig. 1 also has two I/O instructions:

0011 = Load AC from I/O

0111 = Store AC to I/O

In these cases, the 12-bit address identifies a particular I/O device. Show the program execution (using the format of Fig. 2) for the following program:

i) Load AC from device 5
ii) Add contents of memory location 940
iii) Store AC to device 6
 

Assume that the next value retrieved from device 5 is 3 and location 940 contains a value of 2.

Fig-1

 

 

Please SUBSCRIBE to view full question

Topics: N/A Solution is Coming!
2 Marks

Contributors of this Question:

Role Name Date
Uploaded By: Onebyzero Edu Aug. 10, 2024, 2:51 p.m.
Converted By (Img/PDF to Text): Baishakhi Bir Feb. 20, 2026, 2:26 p.m.
Reviewed By: Obaydul Hasan Nayeem Feb. 22, 2026, 3:02 a.m.