Determine a suitable page size for a program of 128 kbytes

Assignment Help Basic Computer Science
Reference no: EM131339550

In a paging system, the page size is p and a program requires P pages. The last page in the program is 50 per cent full. Each page requires t locations in the main memory page table. Obtain an equation for the total amount of main memory required for the program and page table entry combined. Find the page size to give minimum memory requirements by differentiating the total memory requirement equation with respect to p, and equating the result to zero. Determine a suitable page size for a program of 128 Kbytes given four bytes per page entry.

Reference no: EM131339550

Questions Cloud

Deduce an algorithm to pages from the partition : Suppose two use bits are provided. The first use bit is set when the page is first referenced. The second use bit is set when the page is referenced. Deduce an algorithm to pages from the partition, and list the pages.
Who has operated several other profitable stores : For the past year, Store 9 has been managed by a person who has operated several other profitable stores in recent years and is about to be promoted to a larger store. Zoya notices several items that bother her.
Construct an overview of internal and external contingencies : Develop an 8-10 page marketing plan for a sports enterprise (e.g. professional, school, or community program). You can select a particular "real" enterprise or use a fictitious one. You will take the position of the manager and develop a plan that..
How parents should react to the cries of a child : Explain how Behaviorism, Psychoanalytic Theory, and Attachment Theory suggest handling this situation and predict what would be each likely outcome. Explain what the research says regarding how parents should react to the cries of a child
Determine a suitable page size for a program of 128 kbytes : Determine a suitable page size for a program of 128 Kbytes given four bytes per page entry.
Discuss about the integrated marketing communication : Describe, discuss, and analyze all of the various Integrated Marketing Communication (IMC) mix components your product/service uses.Describe, discuss, and analyze the Internet marketing possibilities for your product/service.
How is weighted average cost of capital use to make decision : How is the weighted average cost of capital used to make decisions? What are each of the components of the weighted average cost of capital and how are each of these components estimated?
Office lunchroom remodel project you are managing : You would like to keep a closer eye on some of the tasks for the office lunchroom remodel project you are managing. You decide it is a good idea to add some deadline dates to several tasks. You know that Microsoft Project will alert you if a task'..
Develop the formats of information stored in the page table : Memory can be made read-only or execute-only, and four other levels of privileged access are provided (one for the user and three for routines within the operating system).

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Information security incident-breach in the news or online

Find a recent example of an information security incident/breach in the news or online. Write a 2-page Microsoft® Word paper addressing the following components related to the incident:

  Simulate the drawing of a playing card

Give an example of a for loop in which symmetric bounds are more natural. Give an example of a for loop in which asymmetric bounds are more natural.

  Concept of software as a service

Explain the concept of software as a service (SaaS), and describe at least one application area in which SaaS is becoming important. Do you think the use of SaaS will expand and why or why not?

  Restricting access to the use of communal property

Under what conditions would restricting access to the use of communal property, and thus, regulating the transformation of communal property into private property, be an efficient policy for utilizing property?

  What you learned about information security

Review all the critical thinking assignments you have completed in this course. Prepare a critical review of what you learned about information security and how it will help you in your career.

  Write a program that manipulates a database of product

The program should allow the user to add a record, find a record that matches a product name, and change the price and quantity of a product by a given amount.

  Conducting vulnerability assessment and penetration test

Management is pleased with the progress that has been made, and likes the steps you have taken to set up a secured network environment.

  Applications that you use on a regular basis

Think of several Win/Mac applications that you use on a regular basis, then investigate *nix alternatives for them. Share your findings and conclusions.

  Implement the backend for a list

Using an array to implement the backend for a list, create a list class that can contain integers and implements all of the following funtionality via the following functions:List() - the constructor List (const List& 1) - a copy constructor

  Modular approach for designing networks

Why is it important to use modular approach for designing Networks? Could you anticipate what problems can occur if such methods are not used? Describe your response in two paragraphs.

  Does the diagram meet all three levels of normalization

Does the diagram meet all three levels of normalization? (Patient: *PatientKey *Name *Address City State Zip) (Physician: *PhysicianKey *Name *Address City State Zip)

  What functions does the ciso perform

What functions does the CISO perform, and what are the key qualifications and requirements for the position?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd