Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Question :
The file system is the most visible aspect of an operating system. It provides the mechanism for on-line storage and access to both data and programs of the operating system and to all the users of the computer system.
(a) What is a file?
(b) Many systems require and open system call and a close system call. Explain the purpose of the open and close operations.
(c) Some systems automatically open a file when it is referenced for the first time, and close the file when the job terminates. What is the advantage and disadvantage of this scheme as compared to the more traditional one, where the user has to open and close the file explicitly?
(d) Just as a file must be opened before it is used, a file system must be mounted before it can be available to processes in the system. Describe the mount procedure that is performed by the operating system.
(e) Consider a file system where a file can be deleted and its disk space reclaimed while links to that file still exists.
I. What problems may occur if a new file is created in the same storage area or with same absolute path name?
II. How can these problems be avoided?
How is a process chosen for being swapped either in or out? Swap out: a. If the process is idle. b. If process has been in main memory for a long time.
shell script that accepts two directory names as arguments and delete those file in the second directory that are identical to the file in the first
Device Drivers Communicates straight with peripheral devices (disks, tapes, etc.). Responsible for begin physical I/O operations on the device. Pro
Q. What is the occupation of the object manager? Answer: Substance present a generic set of kernel mode interfaces to user mode programs. Objects are influenced by the execut
Question : a) Describe the difference between the authentication of a user account on a peer to peer network and a client server network. b) Compare an end user account with
What are the different thread levels? There are two broad type of thread implementation: User-Level Threads -- Thread Libraries. Kernel-level Threads -- System Calls.
Q. In a ring-protection system the level 0 has the greatest access to objects and level n (greater than zero) has fewer access rights. The access rights of a program at a partic
1. On every access, mark the page with a timestamp. Whenever we need to evict a page, we search through memory for the oldest page, the least-recently used page. But we need memory
Introduction of linux
linked allocation using i node
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd