Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Write on short note DMA.
Direct Memory Access (DMA) is a technique for transferring data from main to a device without passing it through the CPU. Computers that have DMA channels are able to transfer data to and from devices much more quickly than computers without a DMA channel can. This is helpful for making quick backups and for real-time applications.
A few expansion boards such as CD-ROM cards are capable of accessing the computer's DMA channel. When you install the board, you should specify which DMA channel is to be used, which sometimes engross setting a jumper or DIP switch.
Describe the technique of packing. The physical record size will not accurately match the length of the desired logical record and the Logical records may even differ in length
What are the various page replacement algorithms used for page replacement? FIFO page replacement Optimal page replacement LRU page replacement LRU approximat
What are the disadvantages of linked allocation? The drawbacks are a. Used only for sequential access of files. b. Direct access is not supported c. Memory space neede
What are the five major activities of an operating system in regard to process management? The creation and deletion of both user and system processes The suspension and res
A paper mill produces two grades of paper viz., X and Y. Because of raw material restrictions, it cannot produce more than 400 tons of grade X paper and 300 ton
A page fault causes the following sequence to occur. 1. Trap (shut in) to the operating system. 2. Save the process registers and process state. 3. Verify that the interr
please help us to write a code in c for tree directory structures.
Why is it not possible to enforce memory protection at compile time? Every process should be protected against unwanted interference by other process, whether intentional or
Question: (a) The following table (table 1.0) gives the length of the CPU burst time in milliseconds of processes P 1 to P 4 . Assume the processes arrived in the order P 1 ,
Explain the Real Time Operating System A real-time operating system comprises definite, fixed time constraints. Processing should be done in the defined constraints, or the sys
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd