Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Likewise some systems support many types of structures for a file's data while others simply support a stream of bytes. What are the merits in addition to demerits?
Answer: A merit of having the system support different file structures is that the support comes from the system individual applications aren't required to provide the support. In addition if the system offers the support for different file structures it can implement the support presumably more resourcefully than an application.
The demerits of having the system provide support for defined file types is that it raises the size of the system. In addition applications that may need different file types other than what is provided by the system may not be able to run on such systems.
A substitute strategy is for the operating system to define no support for file structures as well as instead treat all files as a series of bytes. This is the method taken by UNIX systems. The advantage of this method is that it simplifies the operating system support for file systems as the system no longer has to provide the structure for different file types.
In addition it allows applications to define file structures thus alleviating the situation where a system mayn't provide a file definition required for a specific application.
We have talked about blocking locks, which voluntarily yield, and spinlocks, which just spin until they acquire the lock. At ?rst, it seems like spinlocks are verywasteful, and tha
What do you mean by best fit? Best fit allocates the smallest hole that is big sufficient. The entire list has to be searched, until it is sorted by size. This strategy creates
What are the disadvantages of swapping technique used in pre-3BSD UNIX systems? If there is excessively much memory contention, processes are swapped out until sufficient
Explain with an example the need of Shift Alteration in critical section problem? Consider processes P i and P j and consider the algorithm for P i and P j .
Write an application that does the following:(1) fill an array with 50 random integers; (2) loop through the array, displaying each value, and count the number of negative values;
List and discuss the various services provided by the operating system. Program execution - system capability to load a program into memory and to run it. I/O operatio
Explain about deadlock detection? In deadlock situation, the system must provide An algorithm that verifies the state of the system to verify whether a deadlock has occu
Process States A total of nine states are acknowledged by the UNIX system. They are like as follow: User running Executing
Explain the Network protocols There are a wide variety of network protocols to choose from traditionally client - server developers were required to choose a communications pro
What is a client server system? Centralized systems proceed as server systems to satisfy request generated by client systems Server system is able to be broadly div
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd