Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
What are the hardware and software requirements for virtual memory?
The hardware required for virtual memory is a secondary memory and page table. The page table should have the ability to mark an entry as valid or invalid. The secondary memory is the one that holds the pages that are not present in the memory. It is generally a high speed disk and the section used is called swap space.
The main software requirement can be restart any instruction after a page fault occurs. If a page fault take place during instruction fetch the instruction is to be restarted moreover if it occurs during fetch of an operand then the instruction is to be fetched and decoded and then fetches the operand.
Explain a working of file control block A file control block (FCB) has information about the file, containing ownership, permission, and location of the file contents. The log
is the operating system windows sometimes interupts
Explain FIFO page replacement A FIFO replacement algorithm associates with every page the time when that page was brought into memory. When a page must be changed, the oldest p
Memory Protection
What is degree of multiprogramming ? Degree of multiprogramming signifies the number of processes in memory. If the degree of Multiprogramming is steady after that the average
Q. What is the purpose of system calls? Answer: System calls permit user-level processes to request services of the operating system.
What is preallocation? Why do it? Allocating space for a file before making the file to allow for expansion. This reserves space for a certain file so that other files can't gr
As we already know, threadsmust ensure consistency; otherwise, race conditions (non-deterministic results) might happen. Now consider the "too much milk problem": two people share
Two Level Directory This kind of structure overcomes the problems of assigning unique names to the files. Thus there need not be any confusion among users. In this kind of s
Q. In what circumstances is a token-passing network more effectual than an Ethernet network? Answer: A token ring is extremely effective under high sustained load as no colli
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd