Multi tasking environment, Computer Networking

Multi Tasking Environment

Multi tasking exploits parallelism by:

1)  Concurrently using the multiple functional units

2)  Pipelining functional units are pipe line together

3)  Overlapping CPU and I/O activities.

In multitasking environment, there should be a proper mix among task and data structures of a job, in order to make sure their proper parallel implementation.

In multitasking, the useful code of a programme can be use again. The property of allowing one copy of a programme module to be used by more than task in parallel is known as reentrancy.  Non-reentrant code can be used only once throughout lifetime of the programme. The reentrant codes, which may be called many times by dissimilar tasks, are assigned with local variables.

 

Posted Date: 3/4/2013 5:36:02 AM | Location : United States







Related Discussions:- Multi tasking environment, Assignment Help, Ask Question on Multi tasking environment, Get Answer, Expert's Help, Multi tasking environment Discussions

Write discussion on Multi tasking environment
Your posts are moderated
Related Questions
Explain in brief about the Throughput The medium access control protocol should make as well-organized use as possible of the wireless medium to maximize capacity. Number of

Determine the computing infrastructure One solution for the protection of the computing infrastructure is to use digital certificate-based solutions. Users can be given access

what are the applications of different encoding schemes

IGRP uses flash updates, poison reverse updates, hold down times, and divide horizon. How often does it broadcast its routing table updates? Ans) 90 seconds

Name the Twisted pairs cables Twisted pairs cables (Shielded and Unshielded), Coaxial cable and Fiber optic cable. ?Testing of the points ?Testing of the entire network t


Q. Use of Infrared? - Frequencies among 300 GHz and 400 THz - Short-range communication - High frequencies can't penetrate walls - Necessitate line-of-sight propagati

Assume the following 64-bit DES key (expressed in hexadecimal): FEFE FEFE FEFE FEFE (a) What is the term for such a key? (b) State the value of each of the 48-bit round keys

Security Security  is the  protection of hardware software and data  from  unauthorized access. Restricted physical  access to computer password protection limiting  user priv

Q. Host System in TCP-IP model? - Standards adopted because of widespread use like (Internet) - The protocols came first plus the model was really just a description of the