Average time to access a word

Assignment Help Basic Computer Science
Reference no: EM13972030

1. Consider a computer system that has cache memory, main memory (RAM) and disk, and an operating system that uses virtual memory. It takes 1 nsec to access a word from the cache, 10 nsec to access a word from the RAM, and 10 ms to access a word from the disk. If the cache hit rate is 95% and main memory hit rate (after a cache miss) is 99%, what is the average time to access a word?

2. When a user program makes a system call to read or write a disk file, it provides an indication of which file it wants, a pointer to the data buffer, and the count. Control is then transferred to the operating system, which calls the appropriate driver. Suppose that the driver starts the disk and terminates until an interrupt occurs. In the case of reading from the disk, obviously the caller will have to be blocked (because there are no data for it). What about the case of writing to the disk? Need the caller be blocked awaiting completion of the disk transfer?

3. What is a trap instruction? Explain its use in operating systems.

4. Why is the process table needed in a timesharing system? Is it also needed in personal computer systems running UNIX or Windows with a single user?

5. Is there any reason why you might want to mount a file system on a nonempty direc- tory? If so, what is it?

6. For each of the following system calls, give a condition that causes it to fail: fork, exec, and unlink.

7. What type of multiplexing (time, space, or both) can be used for sharing the following resources: CPU, memory, disk, network card, printer, keyboard, and display?

8. Can the count = write(fd, buffer, nbytes); call return any value in count other than nbytes? If so, why?

9. A file whose file descriptor is fd contains the following sequence of bytes: 3, 1, 4, 1, 5, 9, 2, 6, 5, 3, 5. The following system calls are made:

lseek(fd, 3, SEEK SET); read(fd, &buffer, 4); where the lseek call makes a seek to byte 3 of the file. What does buffer contain after the read has completed?

Reference no: EM13972030

Questions Cloud

Time value of money is important aspect of money management : Time value of money is an important aspect of money management. Why is it important to know what interest rates, terms of an agreement, and present value are in relationship to future value when making financial decisions?
Block special file and a character special file : What is the essential difference between a block special file and a character special file?
What annual rate did the coin appreciate from its minting : The brasher doubloon which was featured in the plot of the Raymond Chandler novel The high window, was sold at auction in 2014 for $4,582,500. The coin had a bad face value of $15 when it was first issued in 1787 and had been previously sold for $430..
Analyze relationship between economic activity and resources : Analyze the relationship between economic activity and the resources available in a society. Use technology and information resources to research economic problems and issues.
Average time to access a word : It takes 1 nsec to access a word from the cache, 10 nsec to access a word from the RAM, and 10 ms to access a word from the disk. If the cache hit rate is 95% and main memory hit rate (after a cache miss) is 99%, what is the average time to access..
At what point does a disease become an epidemic, endemic : Explain the impact of at least one major historical contribution on the current status of epidemiological practices. How can history potentially shape and impact our future work in public health and clinical medicine? Explain.
What is the expected return on the portfolio-risk-free rate : Company X owns a portfolio that is invested 19.04 percent in stock A, 39.26 percent in stock B, and the remainder in stock C. What is the expected return (in percents) on the portfolio? Stock A has an expected return of 13.99 percent and a beta of 1...
Complete the execution of programs : Consider a system that has two CPUs, each CPU having two threads (hyperthreading). Suppose three programs, P0, P1, and P2, are started with run times of 5, 10 and 20 msec, respectively. How long will it take to complete the execution of these progr..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  The purpose of the project plans are to demonstrate mastery

The  purpose of the project plans are to demonstrate mastery of project planning using an  applied context. The draft project plan includes all of the project plan elements covered in  Module 1 and 2. The final project plan includes all of the projec..

  Make a marketing plan for

Final Assignment A: Choosing a Business Idea In your next assignment, you'll create a marketing plan for a business. Before you create a marketing plan, you'll think about what type of business you'd like to make a marketing plan for.

  What is the psuedocode

What is the psuedocode?

  Check whether arrays are empty or not

Create a new student with valid first/last name, id, and status.

  Powerpoint are used in the criminal justice system

Question: How do you think Microsoft Office Word and PowerPoint are used in the criminal justice system (CJS). What do you think are the best uses for Microsoft Office Word and PowerPoint in the CJS

  Drawing crow-s foot erd using a specialization hierarchy

Given the following business scenario, create a Crow's Foot ERD using a specialization hierarchy if appropriate.

  Which is not true about the telecommunications act of 1996

Under the rate-of-return regulation, plant depreciation is handled by subtracting the depreciation from the rate base and by the application of return on capital investment. Which of the following is not true about the Telecommunications Act of 1996...

  How to implement in rc4

How to implement in RC4

  What is the goal of computer forensics

What is the goal of computer forensics? How do investigators retrieve and analyze data?How is the information used in investigations?

  Critical infrastructure protection

According to the text, Critical Infrastructure Protection (CIP) is an important cybersecurity initiative that requires careful planning and coordination in protecting our infrastructure.

  Cores on computer systems

Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency,

  Create a if function formula to determatine

Create a if function formula to determatine which boats include a stove with galley. Boats must be able to seat 8 or more people to have stove in the galley.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd