Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
consider the following page reference and reference time strings for a program page reference string 5432143543215show how pages will be allocated
explain a binary semaphore with the help of an examplean abstract data type adt is a semaphore which defines a nonnegative integer variable that
what is a semaphoresemaphore it is a synchronization tool which gives a general-purpose solution to controlling access to critical
what is response ratiohrrn that is highest response ratio next scheduling is a non-preemptive discipline as same to shortest job first sjf wherein
explain any three policies for process scheduling that uses resource consumption informationall three policies for process scheduling are explained
why is segmented paging important as compared to a paging systempaging can be super-imposed upon a segment oriented addressing mechanism to acquire
what is hysteresishysteresis is well known in ferromagnetic materials when an external magnetic field is applied to a ferro magnet the atomic dipoles
define time sharingtime sharing sharing of a computing resource among various users by means of multiprogramming and multi-tasking is termed as
define multiprogrammingmultiprogramming a multiprogramming operating system is system which allows extra than one active user program or part of user
define process control block pcbprocess control block pcb information related with each process is stored into process control
define processprocess it is a program in execution process execution should progress into sequential fashion process contains program counter stack
consider the following system snapshot using data structures in the bankers algorithm with resources a b c and d and process p0 to
explain any three parsing techniquesfollowing are three parsing techniquestop-down parsing this parsing can be viewed as an attempt to get left-most
what is parsingparsing it is the process of analyzing a text made of an order of tokens to find out its grammatical structure regarding a given
explain the techniques used for protection of user filesthis is easier to protect against accidental than malicious misuseprotection of user files
differentiate between protection and security operating system contains a collection of objects software or hardware all objects have a unique name
discuss the different techniques with which a file can be shared among different usersseveral popular techniques with that a file can be shared among
explain concurrent sharingconcurrent sharing some number of programs may share a file concurrently while this is the case this is essential to ignore
explain sequential sharingsequential sharing in this technique of sharing a file can be shared through only one program at a time it is file accesses
what is the advantage of buffering is buffering always effective justify your answer with help of an exampleio buffer one type of input-output
what is an io buffer io bufferone type of input-output requirement arises from devices which have a very high character density as disks and tapes
list out the main requirements between page replacement policies which should be satisfied by a page replacement policy the major requirements that
explain the different page replacement policiesvarious page replacement algorithms are briefly explained below1 first-in first-outfifo page
list the steps needed to perform page replacementthe steps required to perform page replacement are1 find out which page is to be removed from the
discuss two main approaches to reuse free memory area in a heaptwo major approaches to reuse free memory area in a heap arefirst-fit allocate the