Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Define the DosExecPgm Functions used in the OS/2
DosExecPgm (objBuffer, objLen, flags, cmdLine, env, &resultCode, execName)
DosExecPgm function is designed to load an executable image as a child process. An object buffer and its length (objBuffer and objLen respectively) may be specified to receive return information from an unsuccessful exec of the process. The flags parameter specifies optional execution characteristics of the newly created process.
The process may be executed asynchronously or synchronously to the parent process or like a background process. An optional command line (cmdLine) and environment (env) may be passed to the child process. In env is NULL, the child process inherits the parent's environment. A resultCode will be retuned upon completion of the exec. If the child process is asynchronously exceeded successfully, the first ULONG of the resultCode structure will contain the process ID of the new process. The name of the executable image to load is passed last as the execName parameter.
Deadlock Detection and Recovery It's a method of permitting the system to enter a deadlock state, detect it and then recover. Deadlock detection : Is the process of
Many-to-Many Model The many-to-many model- many user-level threads to many kernel-level threads avoids several of the limitations of the one-to-one model, although extending mu
Example 1. The diagram illustrating the data structures of in-memory VFS objects and on-disk objects and their relationships on slide 24 of the lecture notes OSD.4. This diagram i
list the prevention of mechanism for race condition with operating system
File Organization * Sequential * Direct * Indexed A file still if it is stored on a magnetic disk or CD-ROM disk may perhaps have a sequential file organiz
Q. In some systems a subdirectory is able to be read and written by an authorized user just as ordinary files can be. a. Explain the protection problems that could arise. b.
Relocation bits employed by relocating loader are specified by Relocation bits employed by relocating loader are specified by Assembler or Translator
Define Coding in an independent service architecture Coding in an independent service architecture alleviates many of the traditional dependencies of monolithic applications.
A UNIX file system has 1-KB blocks and 4-byte disk addresses. What is the maximum file size if i-nodes contains 10 direct entries, and one single, double, and triple indirect entry
Determine a policy that is not a valid page replacement policy? RU policy (Recurrently used) is not a valid page replacement policy.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd