Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. In the IBM/370 memory protection is offered through the use of keys. A key is a 4-bit quantity every 2K block of memory has a key (the storage key) associated with it. The CPU as well has a key (the protection key) associated with it. A store operation is permitted only if both keys are equal or if either is zero. Which of the subsequent memory-management schemes could be used successfully with this hardware?
a. Bare machine
b. Single-user system
c. A Multiprogramming with a fixed number of processes
d. A Multiprogramming with a variable number of processes
e. Paging
f. Segmentation
Answer:
a. Protection not necessary set system key to 0.
b. Set system key to 0 when in supervisor mode.
c. Region sizes should be fixed in increments of 2k bytes allocate key with memory blocks.
d. Same as above.
e. Frame sizes should be in increments of 2k bytes, allocate key with pages.
f. Segment sizes should be in increments of 2k bytes, allocate key with segments.
Explain the TlsAlloc (VOID) This function is used to allocate a TLS index.Any subsequent TLS function calls will require the handle returned from TlsAlloc to be passed. The i
1. How is reliability enhanced with the microkernel approach to system design? 2. In a virtual machine design where guest operating systems are independent virtual machines sup
Under what circumstances do page faults occur? Describe the actions taken by the operating system when a page fault occurs. A page fault happens when an access to a page that
what is deadlock
Q. What is the major advantage of the layered approach to system design? What are the de-merits of using the layered approach? Answer: As in all cases of modular design as well
Can you give me assistance on my operating system assignment?
Sir i want formulas in Memory management starting from paging till the demang paging in a easy manner for solving problems in competitive exams
My code it didn''t run properly ,i tried to pass 2 parameter example : ./a.out ls -ll ,but it execute only the ls instead of the ls -ll ! plz help amd thank you ! #include #inclu
Deadlocks can be detected while the program is running, by running cycle detection algorithms on the graph that de?nes the current use of resources. De?ne this graph as follows:
What is a general graph? A tree structure where links can go from one branch to a node earlier in the similar branch or other branch, allowing cycles.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd