Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Explain the differences between Paging and segmentation.
Paging and segmentation
Paging
Segmentation
Computer memory is separated into small partitions which are all similar size and considered to as, page frames. Then while a process is loaded this gets divided in pages that are similar size as those earlier frames. The process pages are after that loaded in the frames.
Memory-management scheme which supports user vision of memory.
Computer memory is allocated in different sizes (as segments) depending upon the required for address space through the process.
Address generated through CPU is divided into:
Page number (p) - It used like an index in a page table that contains base address of each page into physical memory.
Page offset (d) - It combined with base address to describe the physical memory address which is sent to the
memory unit.
Logical address contains a two tuple:
< segment-number, offset >
Transparent to programmer (i.e. system
allocates memory)
Includes programmer (i.e. allocates memory to
specific function inside code)
No separate- the protection
To separate the protection
No separate- the compiling
To separate the compiling
No shared-the code
To share the code
'On many systems, you can describe a function matherr which will be known as when there are certain floating-point errors, like errors in the math routines in .
Why can CRC detect more errors than simple Checksum? There are two purposes a CRC can identify more errors than a simple Checksum. 1. Since an input bit is shifted by all th
What is SEGMENT - Assembler directives SEGMENT: This directive defines to assembler the start of a segment with name segment-name. Segment name must be unique and follows the
Variables and Quantifiers: Now we have to diagnose now that if we wanted to say that there is a meal at the Red Lion which costs only 3 pounds, is well sayed. Rather thenif we
Write a script called addnames that is to be called as follows, where classlist is the name of the classlist file, and username is a particular student''s username. ./addnames cla
Speicified the following piece of code: int i = 1; int j = 4; while (i { if (i%3 == 0) i+=3; else i+=4; if (j%2 == 0) j*=4; els
What are the disadvantages of Public Key Cryptography? Disadvantages of Public Key Cryptography are as given below: a) It is used to encrypt a secret key that is used to e
What are the Input devices Various devices are available for data input on graphics workstations. Most systems have a keyboard and one or more additional devices specially desi
What is an "on request Field" statement? ON REQUEST The ABAP/4 Module is known as only if the user has entered the value in the field value as the last screen display .Th
Disadvantages 1. The X12 standard is so large and general 2. EDI communications negotiate a technical agreement to explain exactly what subset of EDI they will use
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd