Average time to access a word

Assignment Help Basic Computer Science
Reference no: EM13972030

1. Consider a computer system that has cache memory, main memory (RAM) and disk, and an operating system that uses virtual memory. It takes 1 nsec to access a word from the cache, 10 nsec to access a word from the RAM, and 10 ms to access a word from the disk. If the cache hit rate is 95% and main memory hit rate (after a cache miss) is 99%, what is the average time to access a word?

2. When a user program makes a system call to read or write a disk file, it provides an indication of which file it wants, a pointer to the data buffer, and the count. Control is then transferred to the operating system, which calls the appropriate driver. Suppose that the driver starts the disk and terminates until an interrupt occurs. In the case of reading from the disk, obviously the caller will have to be blocked (because there are no data for it). What about the case of writing to the disk? Need the caller be blocked awaiting completion of the disk transfer?

3. What is a trap instruction? Explain its use in operating systems.

4. Why is the process table needed in a timesharing system? Is it also needed in personal computer systems running UNIX or Windows with a single user?

5. Is there any reason why you might want to mount a file system on a nonempty direc- tory? If so, what is it?

6. For each of the following system calls, give a condition that causes it to fail: fork, exec, and unlink.

7. What type of multiplexing (time, space, or both) can be used for sharing the following resources: CPU, memory, disk, network card, printer, keyboard, and display?

8. Can the count = write(fd, buffer, nbytes); call return any value in count other than nbytes? If so, why?

9. A file whose file descriptor is fd contains the following sequence of bytes: 3, 1, 4, 1, 5, 9, 2, 6, 5, 3, 5. The following system calls are made:

lseek(fd, 3, SEEK SET); read(fd, &buffer, 4); where the lseek call makes a seek to byte 3 of the file. What does buffer contain after the read has completed?

Reference no: EM13972030

Questions Cloud

Time value of money is important aspect of money management : Time value of money is an important aspect of money management. Why is it important to know what interest rates, terms of an agreement, and present value are in relationship to future value when making financial decisions?
Block special file and a character special file : What is the essential difference between a block special file and a character special file?
What annual rate did the coin appreciate from its minting : The brasher doubloon which was featured in the plot of the Raymond Chandler novel The high window, was sold at auction in 2014 for $4,582,500. The coin had a bad face value of $15 when it was first issued in 1787 and had been previously sold for $430..
Analyze relationship between economic activity and resources : Analyze the relationship between economic activity and the resources available in a society. Use technology and information resources to research economic problems and issues.
Average time to access a word : It takes 1 nsec to access a word from the cache, 10 nsec to access a word from the RAM, and 10 ms to access a word from the disk. If the cache hit rate is 95% and main memory hit rate (after a cache miss) is 99%, what is the average time to access..
At what point does a disease become an epidemic, endemic : Explain the impact of at least one major historical contribution on the current status of epidemiological practices. How can history potentially shape and impact our future work in public health and clinical medicine? Explain.
What is the expected return on the portfolio-risk-free rate : Company X owns a portfolio that is invested 19.04 percent in stock A, 39.26 percent in stock B, and the remainder in stock C. What is the expected return (in percents) on the portfolio? Stock A has an expected return of 13.99 percent and a beta of 1...
Complete the execution of programs : Consider a system that has two CPUs, each CPU having two threads (hyperthreading). Suppose three programs, P0, P1, and P2, are started with run times of 5, 10 and 20 msec, respectively. How long will it take to complete the execution of these progr..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Create a diagram using Visio that lists different IT systems

Identify five different IT systems that have affected business in the past few years (i.e., business software applications, networks, hardware, internet-based technologies, databases).

  Discuss zoning and lun masking practices for virtualization

Storage concepts and application today are critical since our data needs have grown exponentially over the last decade. Virtualization makes storage a bit more complex in terms of configurations and options. Storage can local or remote include use of..

  Study to improving the acceptance of new technology

Simon and Paper (2007) explore the topic of user acceptance to new technologies; in this case voice recognition technology. Reviewing the general constructs of the TAM model the author's analyze, discuss the application of this model and the resul..

  Explain nefarious computer activities called ping sweeps

Your boss has just heard about some nefarious computer activities called ping sweeps and port scans. He wants to know more about them and what their impact might be on the company. Write a brief description of what they are, and include your asses..

  Evaluate ethical issues faced by technology companies

Support your paper with a minimum of five (5) scholarly resources. In addition to these specified resources, other appropriate scholarly resources, including older articles, may be included.

  The modifications are the assignment

The modifications are the assignment!This assignment will require you to think, research and explore, it is not a step-by-step!Work on this assignment on your own!

  Calculate and plot value for inter-arrival time

Assume instead that there is constant inter-arrival time of 0.01 seconds between each consecutive arriving packet. In this case, calculate and plot value of R_tau (t) versus time in steady state for following cases: (i) tau = 0.1 second, (ii) tau..

  Critical infrastructure protection

Critical Infrastructure Protection According to the text, Critical Infrastructure Protection (CIP) is an important cybersecurity initiative that requires careful planning and coordination in protecting our infrastructure.

  Use in order to convert database tables

Describe the steps that you would use in order to convert database tables to the First Normal Form, the Second Normal Form, and the Third Normal Form.Provide one (1) example that is relevant to a college environment that illustrates reasons for..

  Write a problem that prompts the user for a radius

Write a problem that prompts the user for a radius and then prints: •The area and the circumference of a circle with that radius •The volume and surface area of a sphere with that radius

  What is the speedup of the system with l2 cache?

computer calculate the following: (a) What is the L2 read miss penalty? (b) What is the L1 read miss penalty? (c) What is the read penalty (L1 and L2 cache)? (d) Assume 33% (1/3) loads, and everything else is ideal. What is the CPI? (e) What would th..

  Write a pascal program which reads price of an item

write a pascal program which reads price of an item

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd