Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Likewise some systems support many types of structures for a file's data while others simply support a stream of bytes. What are the merits in addition to demerits?
Answer: A merit of having the system support different file structures is that the support comes from the system individual applications aren't required to provide the support. In addition if the system offers the support for different file structures it can implement the support presumably more resourcefully than an application.
The demerits of having the system provide support for defined file types is that it raises the size of the system. In addition applications that may need different file types other than what is provided by the system may not be able to run on such systems.
A substitute strategy is for the operating system to define no support for file structures as well as instead treat all files as a series of bytes. This is the method taken by UNIX systems. The advantage of this method is that it simplifies the operating system support for file systems as the system no longer has to provide the structure for different file types.
In addition it allows applications to define file structures thus alleviating the situation where a system mayn't provide a file definition required for a specific application.
Prepare Gantt Charts and Determine the Average Waiting Time 1. Classify the interaction among the processes on the basis if degree to which they are aware of each other's exi
In which page replacement policy Balady’s anomaly occurs? FIFO (First in First Out)
The scheduling technique in which CPU is allocated to the process with least CPU-burst time is known as Shortest job first Scheduling is a scheduling technique in which CPU i
Question 1 Explain the structure of operating system in detail Question 2 Explain the following scheduling algorithm 1) First come Firs
How many disk operations are needed to fetch the i-node for the file /usr/ast/courses/os/handout.t? Assume that the i-node for the root directory is in memory, but nothing else alo
Usually memory is allocated from a large pool of unused memory area called the heap. In C++, dynamic allocation/deallocation must be manually performed using commands like malloc,
The following information is available for three MPS (Master Product Scheduling) items: Product A An 80 unit order is to be started in Week 3.
ssssss
Q. In some systems a subdirectory is able to be read and written by an authorized user just as ordinary files can be. a. Explain the protection problems that could arise. b.
For example, by initializing a semaphore to 0, threads can wait for an event to occur, and impose an ordering constraint, similar to a monitor using condition variables, but with m
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd