Computer and technology

Assignment Help Computer Networking
Reference no: EM13760284

computer and technology

1. Chapter 3. Question 4

Assume a program has 510 bytes and will be loaded into page frames of
256 bytes each, and the instruction to be used is at byte 377. Answer the
following questions:

a. How many pages are needed to store the entire job?

b. Compute the page number and exact displacement for each of the byte addresses where the data is stored.

2. Chapter 3. Questions 5a, 5b, 5c

Given that main memory is composed of only three page frames for public use
and that a seven-page program (with Pages a, b, c, d, e, f, g) that requests pages
in the following order:
a, c, a, b, a, d, a, c, b, d, e, f

a. Using the FIFO page removal algorithm, indicate the movement of the
pages into and out of the available page frames (called a page trace analysis). Indicate each page fault with an asterisk (*). Then compute the failure and success ratios.

b. Increase the size of memory so it contains four page frames for public use.
Using the same page requests as above and FIFO, do another page trace
analysis and compute the failure and success ratios.

c. What general statement can you make from this example? Explain your
answer.

3. Chapter 3. Questions 6a, 6b, 6c

Given that main memory is composed of only three page frames for public use
and that a program requests pages in the following order:
a, c, b, d, a, c, e, a, c, b, d, e

a. Using the FIFO page removal algorithm, indicate the movement of the
pages into and out of the available page frames (called a page trace
analysis) indicating each page fault with an asterisk (*). Then compute
the failure and success ratios.

b. Increase the size of memory so it contains four page frames for public use.
Using the same page requests as above and FIFO, do another page trace
analysis and compute the failure and success ratios.

c. What general statement can you make from this example? Explain your
answer.

4. Chapter 4. Questions 3a, 3b, 3c

Five jobs arrive nearly simultaneously for processing and their estimated CPU
cycles are, respectively: Job A = 12, Job B = 2, Job C = 15, Job D = 7, and
Job E = 3 ms.

a. Using FCFS, and assuming the difference in arrival time is negligible, in what order would they be processed? What is the total time required to process all five jobs? What is the average turnaround time for all five jobs?

b. Using SJN, and assuming the difference in arrival time is negligible, in what order would they be processed? What is the total time required to process all five jobs? What is the average turnaround time for all five jobs?

5. Chapter 4. Question 7

Using SJN, calculate the start time and finish time for each of these seven jobs:
Job Arrival Time CPU Cycle
A 0 2
B 1 11
C 2 4
D 4 1
E 5 9
F 7 4
G 8 2

Reference no: EM13760284

Questions Cloud

Develop the myclone class : You will also create another class of your choice. Your programmer-defined class should have at a minimum two instance variables and one method - You will create a Virtual World application as your final project. This Virtual World will have sever..
What might be some feasible solutions to the funding problem : Several million people visit these parks each year-an important part of the state's tourism. What might be some feasible solutions to the funding problems of the park system?
Text file containing the data : This program should begin by asking the user for the name of a text file containing the data. Then read the data which will be a line containing the dimensions of a 2 dimensional array followed by a 2 dimensional array of ints. Then perform variou..
Write an application that uses an array : Write an application that uses an Array to store 10 messages of type String. You can load this data structure with 10 messages of your choosing.
Computer and technology : Assume a program has 510 bytes and will be loaded into page frames of256 bytes each, and the instruction to be used is at byte 377. Answer the following questions:
Construct an appropriate chart : Construct an appropriate chart/graph that displays the relevant information for these two variables -  Write the null and alternative hypotheses used to test the question above (e.g., whether participation in the course affects writing scores).
Find an article in the library that relates to developing : Find an article in the library that relates to developing a project (program) charter and then summarize and discuss the article as well as describe based upon what you have learned how you would develop a program charter and merge the topic with the..
Why have chain hotels continued to expand world-wide : Why have chain and brand-identification hotels and motels continued to expand world-wide vs independent properties? Compare and contrast.
What aspects of personality might tend to increase : Explain how personality, satisfaction, motivation and job characteristics can make an individual more or less susceptible to the effects of work pressure and stress? What aspects of personality might tend to increase or decrease work pressure and str..

Reviews

Write a Review

Computer Networking Questions & Answers

  Explain the network''s fundamental characteristics

Review the assignment instructions in the University of Phoenix Material: Integrative Network Design Project. Write a 2- to 4-page paper that includes the following based on your chosen Virtual Organization: Explain the network's fundamental characte..

  Based on the article by semeilogy et al 2007 why have some

based on the article by semeilogy et al. 2007 why have some researchers recommended redesigning the ethernet networking

  Describe role of computer forensics-security in organization

Describe the role of computer forensics and security in the organizations. Explain the roles of computer forensics expert and computer security expert.

  Explain current standards and policies with star clothing

In context of telecommunications standards and policy, create 3-5 page white paper which explains current standards and policies which are suitable to MCG's work with Star Clothing.

  Explaining users a cell can support blocking rate

Find out how many users a cell can support for a 5% call---blocking rate. Assume that each user produces 35mE of load in the busy hour.

  How to decrement the ttl field of the packet

In addition to the above-mentioned  KeyboardInterrupt (used to terminate the program), you will need to handle any I/O-related exceptions.

  Describe the predominant electronic and physical threats to

write a 200- to 300-word response to the following questionsq1. what are the predominant electronic and physical

  What is the maximum data capacity for traffic

What is the maximum data capacity for traffic between Hornsby and North Ryde? What is the maximum data capacity for traffic between Hornsby and the City store?

  Q1 explain clientserver architecture including fat and thin

q1. explain clientserver architecture including fat and thin clients middleware and clientserver tiers.q2. make use of

  Describe the purpose of firewalls

Briefly describe the purpose of firewalls and how they work, including two fundamental approaches to creating firewall policies and types of firewalls.

  File transfer protocol

The File Transfer Protocol (FTP) uses which transport protocol, TCP or UDP

  Deliver a research paper and presentation based on your

deliver a research paper and presentation based on your research.future threats to network security and planning for

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd