What is the main advantage of multiprogramming

Assignment Help Operating System
Reference no: EM132546

QUESTION 1

a) What is the main advantage of multiprogramming?

b) How does the distinction between the monitor mode and user mode function as a rudimentary form of protection (security) system?

c) What is the difference between a trap and an interrupt? What is the use of each function?

d) For what type of operations is the DMA useful? Justify your answer.

e) What are the 5 major activities of an operating system in regard to process management?

f) Briefly Explain the following types of Virtual Machines

i) Process VM
ii) System VM
iii) Hosted VM

g) As the system administrator of small and medium enterprise, explain how you can use the hosted virtual machine to create and environment which can provide multiple servers like a database server, a web server, an application server and an email server at low cost?

QUESTION 2

a) List two services provided by Active Directory?

b) Give examples of objects that can be found in Active Directory.

c) Explain the logical and physical structure of active directory. In your explanation list and describe any two entity (apart from trees and forests) that makes up the logical structure of Active Directory

d) There are the two ways for structuring Active Directory, either by using functions or locations. Explain each using relevant examples

e) What are the items and tasks that need to be completed before the installation of Active Directory?

f) What are the three elements that need to be shared among trees?

g) List and explain the three most common ways used to name domains?

QUESTION 3

a) List and explain the two main types of groups that can be created in active directory

b) List and briefly describe the three main types of group scope found in Active Directory?

c) In the following two situations, clearly explain what type of group scope you will use.

i) As the system administrator of your company, you are creating groups in a new domain in an Active Directory tree. You have resource on a Windows 2000 domain controller in the domain that will be accessed by groups from the local domain and from four other domains. What type of groups should you use?

ii) In an effort to reduce the number of calls handled by the help desk in your organization, you have decided to create a group of "user mentors" that will receive extra training and some extra permissions on the network. These users will be able to manage the user computers, which are grouped in a single OU in each of your six domains. They will also be able to reset the password of the users that are also grouped in an OU in each domain. The users that will be part of the program are scattered throughout the six domains. What type of group should you use to delegate the permissions they will need?

d) Using examples, explain the term Built-In Groups

QUESTION 4

a) When installing windows server, there are some important considerations that have to be taken care of by the administrator

i) Once a partition has been created for windows installation, the administrator has to select the file system to format the partition. Differentiate between the following file systems and specify which one is preferable

i. NTFS
ii. FAT
iii. FAT32

ii) To install windows server, a Client Access license (CAL) is required. Explain the two modes of licensing available for windows server

b) During Linux operation system installation, once the disk partitioning is performed, the installer formats the partition

i) What is the file system used for Linux operating systems?

ii) A swap partition is also created by default. Explain the purpose of the swap partition

c) Once the operating system is installed or in order to complete the installation, an important step is to make the machine available on the network. When using TCP/IP, computers can be configured to use either dynamic or static IP addressing

i) Explain the difference between static and dynamic IP addressing mode

ii) List two basic information required the static IP address of a host

 

 

Reference no: EM132546

Questions Cloud

Is eco marketing always honest and ethical : In your opinion, what are the negative impacts of this growing demand on the physical state of the outdoor recreation sites in Mauritius? Is eco marketing always honest and ethical? Explain with examples related to outdoor recreation
Multilevel feedback queues and fcfs : What (if any) relation holds between the following pairs of sets of algorithms (a) Priority and SJF (b) Multilevel feedback queues and FCFS
Explain the client-server architecture : What are the three different categories of command, support your answer by giving three examples. Give three good reasons, with valid explanation, to justify why partitioning hard disk provides a variety of advantages. Explain the client/server..
What is the main advantage of multiprogramming : What is the main advantage of multiprogramming How does the distinction between the monitor mode and user mode function as a rudimentary form of protection (security) system What is the difference between a trap and an interrupt? What is the u..
Explain deadlock-avoidance system : What is the difference between a safe state and an unsafe state in a deadlock-avoidance system?
Explain the concepts of consumable and reusable resources : Explain the concepts of consumable and reusable resources
Write a program use a matrix represent : Write a Program Use a matrix represent.
How to set up or recover cybersecurity : How to set up or recover cybersecurity.

Reviews

Write a Review

 

Operating System Questions & Answers

  Threads

Explain a complication that concurrent processing adds to an operating system.

  Issues with trusted platform module

Research paper discussing the issues with Trusted Platform Module (TPM)

  Define critical path and cpm

Define Critical Path and CPM. Define Networks & Network scheduling

  Give three technical merits of unix

Give three technical merits of UNIX b) Differentiate between "clustered systems" and "real-time systems". c) Describe the purpose of using "trust relationship"

  Develop a user mode command interpreter

Develop a user mode command interpreter which support list-short.

  Deadlock avoidance and scheduling

Deadlock Avoidance and Scheduling

  Explain deadlock-avoidance system

What is the difference between a safe state and an unsafe state in a deadlock-avoidance system?

  Memory allocation in operating system

Analysis and implementation of algorithms for memory allocation in operating system, Explain First- t and best- t methods are used in memory allocation in operating systems.

  Marginal and average cost curves

n a competitive market place (pure competition) is it possible to continually sell your product at a price above the average cost of production.

  Disk scheduling algorithm

Simulation of Elevator and Shortest Seek Time First

  Define the term context switch

Define the term context switch. Explain how context switching takes place. (use a diagram, with two processes)

  Write a multi-threaded program

Write a multi-threaded program to solve producer and consumer problem

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd