Activities of operating system-secondary-storage management, Operating System

Q. What are the three main activities of an operating system in regard to secondary-storage management?

Answer:

1) Free-space management

2) Storage allocation

3) Disk scheduling

Posted Date: 7/27/2013 2:18:22 AM | Location : United States







Related Discussions:- Activities of operating system-secondary-storage management, Assignment Help, Ask Question on Activities of operating system-secondary-storage management, Get Answer, Expert's Help, Activities of operating system-secondary-storage management Discussions

Write discussion on Activities of operating system-secondary-storage management
Your posts are moderated
Related Questions

What is the exclusive feature of UNIX Shell is the exclusive feature of UNIX.

Objectives 1.    Login to UNIX system and logout 2.    Learn features of the vi editor and to use online help (main pages).  Gain experience using them to create a document

Explain a working of file control block A file control block (FCB) has information about the file, containing ownership, permission, and location of the file contents. The log

We are faced with three major components of the page-fault service time. 1. Service the page-fault interrupts. 2. Read in the page. 3. Restart the processes.

Define the difference between preemptive and nonpreemptive scheduling. State why strict nonpreemptive scheduling is unlikely to be used in a computer center. Preemptive schedul

Q. Why is it significant to balance file system I/O among the disks as well as controllers on a system in a multitasking environment? Answer: A system can perform mere

State the advantage of multiprocessor system? The advantages of multiprocessor system are:- a)      Enhanced throughput. b)      Economy of scale. c)       Enhanced re

. A paper mill produces two grades of paper viz., X and Y. Because of raw material restrictions, it cannot produce more than 400 tons of grade X paper and 300 tons of grade Y paper

The permission function is used to calculate what, if any access each class or level of user has to each file on a Unix machine. The permission task is one of the data components s