Keyboard device stored keystrokes in a buffer

Assignment Help Basic Computer Science
Reference no: EM131299758

Suppose that the keyboard device stored keystrokes in a buffer until it was full then sent the entire buffer for processing. What would be some adverse consequences? (Two or three sentences should be adequate to answer this question)

Consider the steps required to write a block of data from a disk to memory. Outline the major sequence of I/O events that must occur to make this possible. (There are three major steps)

How is an arithmetic overflow error or divide by zero error interrupt different than an interrupt from the hard disk controller signaling that a data transfer has completed? (Three or four sentences are sufficient)

Suppose that all programs in a particular CPU are given 50 clock cycles to process before getting swapped out for another program.  Suppose also, that it takes 5 CPU clock cycles to swap out the process control block (PCB) for a particular program and restore the next program's PCB. What percent of the CPU clock cycles are used for processing 100 programs? (Hint: calculate: Program clock cycles / (Swap clock cycles + Program clock cycles)). Show your work and how you arrived at the solution.

For a display of 1920 pixels by 1080 pixels at 16 bits per pixel how much memory, in megabytes, is needed to store the image?

What is the average rotational latency of a hard drive rotating at 7,200 RPM or 120 revolutions per second? (Give your answer in milliseconds)

Answer both part a and b.

What is the responsibility of the dispatcher during a context-switch?

There are two levels of scheduling. One level of scheduling determines which jobs will be admitted to the system and in what order. What does the other level of scheduling do?

There are many obvious advantages of a Graphical User Interface (GUI). But what are some disadvantages of a GUI?

How many 512 byte blocks are required to store a 1.6MB file?

Perform the Round-Robin dispatch algorithm, with time quantum  equal to 300 milliseconds, on the job queue and calculate:

Job 1 arrives at time 0 and needs 500 milliseconds to complete.

Job 2 arrives at time 300 milliseconds and needs 400 milliseconds to complete.

Job 3 arrives at time 400 milliseconds and needs 200 milliseconds to complete.

Job 4 arrives at time 400 milliseconds and needs 500 milliseconds to complete.

The average wait time. (Hint: average the number milliseconds each job was in a wait state)

Average turn-around-time. (Hint: for each job, count the number of milliseconds from arrival to completion and average)

Reference no: EM131299758

Questions Cloud

Permanent funds are classified as : During the current year, the earnings from this gift were $24,000. The earnings from this gift should generally be considered revenue to which of the following funds?
Explain way that business organization use mobile technology : Next, determine at least two ways that business organizations use mobile technologies to become more efficient, productive, and profitable. Support your response.
Create a shell script to manipulate passwd file in directory : Create a shell script (lab2_q2.sh) to manipulate passwd file in /etc directory to automate some tasks. Filter list1.txt file containing the word "ball". Display on the screen and also save to the file ball.txt.
What is appropriate entry when the city receives interest : Previously Atomic City had issued bonds with a face value of $10 million to construct a new city hall. Because the money will not be needed for several months, the city invested the bond proceeds in U.S. Government securities. Assume that the city..
Keyboard device stored keystrokes in a buffer : Suppose that the keyboard device stored keystrokes in a buffer until it was full then sent the entire buffer for processing. What would be some adverse consequences? (Two or three sentences should be adequate to answer this question)
Personal loan officer at first national bank : Abagail Nelson, a 25-year-old personal loan officer at First National Bank- How much will she have accumulated when she turns 65 if she invests in equities and earns 8 percent on average?
What is an irrevocable living trust : Contributions. How can contributions to charitable organizations help in estate planning?
Single greatest physical threat to information systems : 1. What do you think is the single greatest physical threat to information systems? Fire? Hurricanes? Sabotage? Terrorism? Others? Be prepared to support your answers.
Analyze the functionality of the members relationships : Analyze the functionality of the members' relationships. Analyze the centrality of the members' relationships. Cross reference the ‘in' measures of centrality with the ‘out' measures of centrality.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Should the civil engineers be held accountable for any harm

Yet should not the engineers also be expected to contract with computer specialists who agree to be partially accountable for the end-use effects of their programs?

  User defined objects with constructors

User defined objects with constructors A two dimensional array  Objects are an important part of this project. I want to see that you have an understanding of how to develop your own objects/classes.

  Interest compounding weekly

An account is opened with an initial deposit of $8,500 and earns 3.7% interest compounded semi-annually for 35 years. How much more would the account have been worth if the interest were compounding weekly? (Round your answer to the nearest cent.)

  Write a preprocessing script to create a file

Write a preprocessing script to create a file

  Self-mappings of ihi

Prove that if a linear fractional transformation w = (az + b) / ( cz + d) maps the real line of the z plane into the real line of the w plane, then a , b, c, and d must all be real, except possibly for a common phase factor that can be remov..

  Advantages and disadvantages of supporting links to files

Some systems provide file sharing by maintaining a single copy of a file. Other systems maintain several copies, one for each of the users sharing the file. Discuss the relative merits of each approach.

  Individual-file processing

The following assignment incorporates the concepts from prior weeks (variables, if-else logic, loops, and arrays), along with this week's topic of file input/output process.

  Display a message informing the user

Modify the program that you wrote for Programming Challenge 20 (Freezing and Boiling Points) so it reads its input from a file instead of the keyboard. Perform the necessary test to determine if an error occurs when the file is opened. If an error..

  Contrast risk threat and vulnerability

It is an accepted truth that without risk there can be no gain. Every individual and organization who wants to succeed must take some risks. Risk management is not about not taking risks, but about taking risks in a controlled environment for which o..

  Preferred method of communicating

1) What is your preferred method of communicating with others? (phones, letters, email, or texting?) In which method do you get the best responses?

  How to install windows server on the servers at wadley inc

Write a 350- to 500-word paper on how to install Windows Server 2012 on the servers at Wadley, Inc. Also, cover how to install Active Directory and how it functions. Explain the schema and global catalog.

  Determine number and sequence of i, b, and p frames

the mpeg stat program can be used to display statistics for video streams.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd