Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Explain the differences between Paging and segmentation.
Paging and segmentation
Paging
Segmentation
Computer memory is separated into small partitions which are all similar size and considered to as, page frames. Then while a process is loaded this gets divided in pages that are similar size as those earlier frames. The process pages are after that loaded in the frames.
Memory-management scheme which supports user vision of memory.
Computer memory is allocated in different sizes (as segments) depending upon the required for address space through the process.
Address generated through CPU is divided into:
Page number (p) - It used like an index in a page table that contains base address of each page into physical memory.
Page offset (d) - It combined with base address to describe the physical memory address which is sent to the
memory unit.
Logical address contains a two tuple:
< segment-number, offset >
Transparent to programmer (i.e. system
allocates memory)
Includes programmer (i.e. allocates memory to
specific function inside code)
No separate- the protection
To separate the protection
No separate- the compiling
To separate the compiling
No shared-the code
To share the code
The next important effort in the direction of devising an electromechanical computer was made at Harvard University mutually sponsored by IBM and Department of UN Navy, Howard Aike
Q. Explain Memory Write operation? Memory write operation transfers content of a data register to a memory word M selected by the address. Presume that data of register R1 is t
This covers a number of game playing methods, notably checkers and backgammon because so much good research has been completed on these problems and because so many different metho
Explain about the network security. Network security implies the protection of networks and their services through unauthorized access, destruction or disclosure, modificati
Multiple valued logics: Multiple valued logics, where altered types of truth value such as "unknown" are may be allowed. These have some of the particular advantages of fuzzy
Q. What is Multiple Interrupt Lines? Multiple Interrupt Lines: Simplest solution to problems above is to provide multiple interrupt lines that will result in immediate recognit
Q. What do you mean by File? In computer vocabulary, file is a collection of text or data stored on a storage device, such as a Floppy Disk or Hard Disk. If you a fresher to c
Performance and Issues in Pipelining Efficiency: The efficiency of a pipeline can be calculated as the ratio of busy time span to the entire time span including the idle time
Q. Registers used in IA-64 architecture ? Registers: The IA-64 architecture comprises a very generous set of registers. It has an 82-bit floating point as well as 64-bit inte
Q. Explain about PARAM Super computer? PARAM is a high-performance, industry standard and scalable computer. It has developed from concepts of distributes scalable computers ma
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd