Average time to access a word

Assignment Help Basic Computer Science
Reference no: EM13972030

1. Consider a computer system that has cache memory, main memory (RAM) and disk, and an operating system that uses virtual memory. It takes 1 nsec to access a word from the cache, 10 nsec to access a word from the RAM, and 10 ms to access a word from the disk. If the cache hit rate is 95% and main memory hit rate (after a cache miss) is 99%, what is the average time to access a word?

2. When a user program makes a system call to read or write a disk file, it provides an indication of which file it wants, a pointer to the data buffer, and the count. Control is then transferred to the operating system, which calls the appropriate driver. Suppose that the driver starts the disk and terminates until an interrupt occurs. In the case of reading from the disk, obviously the caller will have to be blocked (because there are no data for it). What about the case of writing to the disk? Need the caller be blocked awaiting completion of the disk transfer?

3. What is a trap instruction? Explain its use in operating systems.

4. Why is the process table needed in a timesharing system? Is it also needed in personal computer systems running UNIX or Windows with a single user?

5. Is there any reason why you might want to mount a file system on a nonempty direc- tory? If so, what is it?

6. For each of the following system calls, give a condition that causes it to fail: fork, exec, and unlink.

7. What type of multiplexing (time, space, or both) can be used for sharing the following resources: CPU, memory, disk, network card, printer, keyboard, and display?

8. Can the count = write(fd, buffer, nbytes); call return any value in count other than nbytes? If so, why?

9. A file whose file descriptor is fd contains the following sequence of bytes: 3, 1, 4, 1, 5, 9, 2, 6, 5, 3, 5. The following system calls are made:

lseek(fd, 3, SEEK SET); read(fd, &buffer, 4); where the lseek call makes a seek to byte 3 of the file. What does buffer contain after the read has completed?

Reference no: EM13972030

Questions Cloud

Time value of money is important aspect of money management : Time value of money is an important aspect of money management. Why is it important to know what interest rates, terms of an agreement, and present value are in relationship to future value when making financial decisions?
Block special file and a character special file : What is the essential difference between a block special file and a character special file?
What annual rate did the coin appreciate from its minting : The brasher doubloon which was featured in the plot of the Raymond Chandler novel The high window, was sold at auction in 2014 for $4,582,500. The coin had a bad face value of $15 when it was first issued in 1787 and had been previously sold for $430..
Analyze relationship between economic activity and resources : Analyze the relationship between economic activity and the resources available in a society. Use technology and information resources to research economic problems and issues.
Average time to access a word : It takes 1 nsec to access a word from the cache, 10 nsec to access a word from the RAM, and 10 ms to access a word from the disk. If the cache hit rate is 95% and main memory hit rate (after a cache miss) is 99%, what is the average time to access..
At what point does a disease become an epidemic, endemic : Explain the impact of at least one major historical contribution on the current status of epidemiological practices. How can history potentially shape and impact our future work in public health and clinical medicine? Explain.
What is the expected return on the portfolio-risk-free rate : Company X owns a portfolio that is invested 19.04 percent in stock A, 39.26 percent in stock B, and the remainder in stock C. What is the expected return (in percents) on the portfolio? Stock A has an expected return of 13.99 percent and a beta of 1...
Complete the execution of programs : Consider a system that has two CPUs, each CPU having two threads (hyperthreading). Suppose three programs, P0, P1, and P2, are started with run times of 5, 10 and 20 msec, respectively. How long will it take to complete the execution of these progr..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write a program that performs boolean expressions

Read in a month and determine the number of days in the month. If the month is February, prompt the user for a year and determine if the year is a leap year to output the correct number of days.

  A change to my coin tossing program

A change to my Coin Tossing program

  Write a java, c#,c/c++ program for file/directory processing

A Report showing the program performing each of the 7 actions correctly (use screenshots), plus screenshots showing the error reporting situations

  Pvss has ever conducted an audit

Your project lead has asked you to determine if PVSS has ever conducted an audit. After further investigation of the situation, you determine that this will be the first review that PVSS has conducted or to which it has been subjected. Your pr..

  How offset potential negative implications of the adoption

Develop a virtualization adoption plan applicable to the scenario by doing the following.

  Odd-length cycle in directed graph by linear-time algorithm

Give a linear-time algorithm to find an odd-length cycle in a directed graph. You may NOT assume that the graph is strongly connected.

  Literature for information on position of cko

Investigate literature for information on position of CKO and find out an approximate percentage of firms with knowledge management initiatives which have CKOs.

  Override the insert method in bst

You should override the insert method in BST. Your overriding method should first call the method it is overriding. When 50 insertions have been performed since the last rebalancing.

  String s of lowercase english letters

Given a string S of lowercase English letters, write a program to find the longest magic string than can be obtained by removing some letters of S. If there are more than one solutions, choose the longest magic string which is lexicographically small..

  Design process

You have recently started your own software design company. You discover that your local DMV is looking to build a system that will allow receptionists to check customers in quickly. They would like for the system to allow customers to self-check-in ..

  What heading do the list of previously saved files appear

Sometimes, we may need to work with presentations that were created in earlier versions of Microsoft PowerPoint, such as PowerPoint 2003 or PowerPoint 2000. When we open these kinds of presentations, they will appear in

  Why would a network manager benefit

Why would a network manager benefit from having network management tools? Describe 5 scenarios.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd