Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
People arrive at a barber shop at the rate of one every 4.5 minutes. If the shop is full (it can hold five people altogether), 30% of the potential customers leave and come back in 60 ± 20 minutes. The others leave and do not return. One barber gives haircut in 8 ± 2 minutes, whereas the second talks a lot and it takes 12 +/- 4 minutes. If both barbers are idle, a customer prefers the first barber. Treat customers trying to reenter the shop as if they are new customers. Simulate the system until 300 customers have received the haircut.
a. Estimate the balking rate, that is, the number turned away per minute.
b. Estimate the number turned away per minute who do not try again.
c. What is the average time spent in the shop?
d. What is the average time spent getting a hair cut, not including the delay?
e. What is the average number of customers in the shop?
Symmetric multiprocessing To get maximum reliability and efficiency a mode of function called as symmetric multiprocessing is used. In essence, with SMP any program or threads
When a computer is started on, the program that executed first is named the ''operating system.'' It controls pretty much all applications in the computer. This adds who logs in, h
Some CPUs provide for more than two modes of operation. What are two possible uses of these multiple modes?
Q. Is disk scheduling except FCFS scheduling useful in a single-user environment? describe your answer. Answer: In a single-user environment the I/O queue typically is empty.
State critical section problem? Discuss three solutions to solve the critical section problem. C-S Problem:- n processes all competing to use some shared data Every
Question: a) There are main goals of data security. List them and elaborate on how they provide protection. b) Describe threats associated with data security. c) Describe
Consider a scenario of post mailbox, there are two processes named sender S and receiver R. Both processes can communicate with each other by name along with message. You need to I
Define Latency plus seek time The total time to arrange a disk drive mechanism for a block of data to be read from is its Latency plus seeks time
File structure Certain files must conform to a needed structure that is understood by the operating system. The operating system may consist that an executable file has a parti
what is interval timer
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd