Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
How is process management done in multiprocessing systems?
There are two accost for the process management in multiprocessor systems.
In master-slave configuration one of the processor units is identified as the master processor, which implements the OS routines and performs all control functions in the system. So the master processor decides which process to execute on which processor. All other processors are slaves to the master they basically perform the tasks detailed to them by the master. The disadvantages and advantages of the master-slave configuration are:
In symmetrical multiprocessors, a processor is identical in their ability to perform control functions. A processor selection is stimulated whenever an interrupt is raised in the system. The chosen processor handles the interrupt. The remaining of the system can continue its operation. This provides improved reliability than master-slave configuration. A disadvantage of the system is that it doesn't fully exploit the potential of multiple processors in the system.
Regard as a computer system that runs 5000 jobs per month with no deadlock-prevention or deadlock-avoidance scheme. Deadlocks take place about twice per month and the operator must
A UNIX file system has 1-KB blocks and 4-byte disk addresses. What is the maximum file size if i-nodes contains 10 direct entries, and one single, double, and triple indirect entry
swapping technique
What are Tree-structured directories We can generalize the directory structure to a tree of arbitrary height. This permits the user to create their own sub directories and to c
Explain the basic concepts of segmentation. Segmentation definition User view of program Hardware used with diagram-segment table, base, limit & offset Protection and
Q. Most WANs utilize only a partially connected topology. Why is this subsequently Answer: Cost. A completely connected network requires a link between every node in the netw
time-stamping It is a method proposed by Lamport, used to sequencing events in a distributed machine without the use of clocks. This process is intended to order events consis
Q. A Burroughs B7000/B6000 MCP file is able to be tagged as sensitive data. When such a file is removed its storage area is overwritten by some random bits. For what reason would
What are the allocation methods of a disk space? Methods of allocating disk space which are widely in use are a. Contiguous allocation b. Linked allocation c. Indexed
what is internal fragmentation?
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd