Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
What are the hardware and software requirements for virtual memory?
The hardware required for virtual memory is a secondary memory and page table. The page table should have the ability to mark an entry as valid or invalid. The secondary memory is the one that holds the pages that are not present in the memory. It is generally a high speed disk and the section used is called swap space.
The main software requirement can be restart any instruction after a page fault occurs. If a page fault take place during instruction fetch the instruction is to be restarted moreover if it occurs during fetch of an operand then the instruction is to be fetched and decoded and then fetches the operand.
What are kernels and what do kernels do? The kernel is a program that comprises the central core of a computer operating system. It has entire control over everything that
idle thread The special thread a dispatcher will run when no ready thread is found. The primary purpose of the idle process and its threads is to remove what would otherwise b
Processes have valid and invalid entries on their page tables. The valid entries all point to some where "real" (e.g. a physical page, or some portion of disk in case of non-reside
What is indexed allocation? Every file has its own block of pointers to the sectors of the file.
problems of procedure
what is secondary storage management
Q. Timers could be utilized to compute the current time. Provide a little description of how this could be accomplished. Answer: A program could utilize the following ap
wat are the commands used for creating the file hierarchy
What is external fragmentation? As process are removed from and loaded to the memory free memory space is bracken into pieces .external fragmentation take place when enough mem
Q. Consider a calculating environment where a process is given the privilege of accessing object only n times. Suggest a scheme for implementing this policy. Answer: Add an i
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd