Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
The different paging techniques are
1. Multilevel paging or hierarchical paging method: In definite cases the page table may consist up to 1 million entries. This would be as well large to accommodate in the main memory. One simple solution with this problem is to divide the page table into smaller pieces.
2. Hashed page table method: A general method for handling address spaces larger than 32 bits is to use a hashed page table with the hash value being the virtual page number. Every entry in the hash table contains a linked list of elements that hash to the same location.
3. Inverted page table method: An inverted page table has one entry for every real page of memory. Every entry consists of the virtual address of the page stored in threat real memory location, along with information about the process that owns that page.
4. Shared pages method: Shared page tables are typically implemented as multiple virtual addresses that are mapped to one physical address.
5. Demand paging method: This is alike to a paging system with swapping. Processes inhabit on the secondary memory. When we would like to execute a process, we swap it in to the memory.
How are file sharing and protection implemented? To implement file protection and sharing, the system ought to maintain more file and directory attributes than are needed on a
Differentiate tightly coupled systems and loosely coupled systems? Loosely coupled systems:- Every processor has its own local memory Every processor can communicate
Demand paging With demand paging, a page is called into memory only when a location on that page is actually indexed during run time. With pre-paging, pages other than the one
An operating system provides the environment within that programs are executed. Internally operating systems differ greatly in their makeup because they are organized along many di
Define Program preemption The Forced de-allocation of the CPU from a program which is executing on the CPU is known as Program preemption
best fit
Q. Advantages and disadvantages of multiprogramming? Advantages 1. High CPU utilization. 2. It appears that many programs are allotted CPU almost concurrently. D
Define lazy swapper. Rather than swapping the entire process into main memory, a lazy swapper is used. A lazy swapper never swaps a page into memory unless that page will be ne
Write a short note on peer-to-peer computing. Peer-to-peer (P2P) system model is a kind of distributed OS. In this model, clients and servers aren't distinguished from one anot
Define busy waiting and spinlock. When a process is in its significant section, any other process that tries to enter its critical section must loop continuously in the entry c
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd