How has it changed the landscape of desktops and servers

Assignment Help Basic Computer Science
Reference no: EM13952678

1. In a multiprogramming and time-sharing environment, several users share the system simultaneously. This situation can result in various security problems.

a. What are two such problems?

b. Can we ensure the same degree of security in a time-shared machine as in a dedicated machine? Explain your answer.

2. What network configuration would best suit the following environments? Explain your answers.

a. A dormitory floor

b. A university campus

c. A state

d. A nation

3. Describe the five major activities of an operating system in regard to file management?

4. What is the main advantage for an operating-system designer of using a virtual-machine architecture? What is the main advantage for a user?

5. Describe the differences among short-term, medium-term, and long term scheduling.

6. What are the benefits and detriments of each of the following? Consider both the systems and the programmers' levels.

a. Synchronous and asynchronous communication

b. Automatic and explicit buffering

c. Send by copy and send by reference

d. Fixed-sized and variable-sized messages

7. Provide two programming examples in which multi-threading does not provide better performance than a single-threaded solution.

8. Can a multi-threaded solution using multiple user-level threads achieve better performance on a multiprocessor system than on a single-processor system? Explain.

9. Discuss how the following pairs of scheduling criteria conflict in certain settings.

a. CPU utilization and response time

b. Average turnaround time and maximum waiting time

c. I/O device utilization and CPU utilization

10. Consider a system implementing multilevel queue scheduling. What strategy can a computer user employ to maximize the amount of CPU time allocated to the user's process?

11. What is the meaning of the term busy waiting? What other kinds of waiting are there in an operating system? Can busy waiting be avoided altogether? Explain your answer.

12. Windows Vista provides a new lightweight synchronization tool called slim reader-writer locks. Whereas most implementations of reader- writer locks favor either readers or writers or perhaps order waiting threads using a FIFO policy, slim reader-writer locks favor neither readers nor writers, nor are waiting threads ordered in a FIFO queue. Explain the benefits of providing such a synchronization tool.

13. Explain the difference between internal and external fragmentation.

14. Compare paging with segmentation with respect to the amount of memory required by the address translation structures in order to convert virtual addresses to physical addresses.

15. Discuss the hardware support required to support demand paging.

16. Assume that you are monitoring the rate at which the pointer in the clock algorithm (which indicates the candidate page for replacement) moves. What can you say about the system if you notice the following behavior:
a. Pointer is moving fast
b. Pointer is moving slow

17. What are the advantages and disadvantages of a system providing mandatory locks instead of providing advisory locks whose usage is left to the users' discretion?

18. Some systems automatically open a file when it is referenced for the first time, and close the file when the job terminates. Discuss the advantages and disadvantages of this scheme as compared to the more traditional one, where the user has to open and close the file explicitly.

19. Discuss how performance optimizations for file systems might result in difficulties in maintaining the consistency of the systems in the event of computer crashes.

20. In what situations would using memory as a RAM disk be more useful than using it as a disk cache?

21. What is an operating system? What are the functions of an operating system? Have these definitions changed over time?

22. Discuss the trade-offs involved in choosing a time quantum in CPU scheduling. Does the choice of a good quantum depend on how the system will be used?

23. What are the differences between single-threaded vs. multi-threaded processes?

24. What is a batch file? What purposes does a batch file have?

25. Find a file system which you have used (like the NTFS used in Windows, for example), and describe some of its properties in terms of the concepts discussed in the text: for example, what attributes are stored per file, or what directory structure is used?

26. What is a VMware? How has it changed the landscape of desktops and servers?

Reference no: EM13952678

Questions Cloud

One of the most significant areas of audit planning : One of the most significant areas of audit planning and risk assessment is to become expertly knowledgeable about the industry or industries that the audit client operates in. This may involve multiple SBU's (Strategic Business Units).
What must be wavelength of the beam if the light reflected : A layer of oil of thickness 200nm floats on top of a layer of water of thickness 400nm resting on a flat metallic mirror. The index of refraction of oil is 1.24 and that of the water is 1.33. A beam of light is normally incident on these layers. W..
Based on this analysis would you recommend : Based on this analysis, would you recommend that the loan be approved?  Compute each of the above ratios for Bao Corporation.
Application of new technology to solving issues : How does this case illustrate the application of new technology to solving issues that have never been tied to technology? Can you think of other ways technology might be used to address diversity/ EEO/ affirmative action issues?
How has it changed the landscape of desktops and servers : Discuss how performance optimizations for file systems might result in difficulties in maintaining the consistency of the systems in the event of computer crashes.
What is the critical angle for this core-cladding interface : For what range of angles inside the fiber at the entrance to the fiber (θ2) will light be totally internally reflected at the upper edge of the fiber? To what range of incidence angles (θ1) does this correspond?
Discussion assignment needs completed : Identify and discuss the key steps in the closing process that provide the most opportunity to make mistakes in processing account transactions. Why did you select these steps and what makes them confusing?
Problem regarding the new organizational form : In deciding to go to a new organizational form, what impact should the capabilities of the following groups have on your decision?
Develop an understanding of the fundamental concepts : Develop an understanding of the fundamental concepts of the finance discipline - Critically analyse complex contemporary business issues using appropriate models and make reasoned recommendations based on a synthesis of theory and evidence

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Differences between scholarly resources and popular resource

Detail how you will be most effective and efficient in finding resources that fit your research needs.

  Find probability of having no umbrella if it rains

When rain is forecast, Mr. Pickwick takes his umbrella. When rain is not forecast, he takes it with  probability 1/3. Find the probability that Pickwick has no umbrella, given that it rains.

  Write a program that reads a java source

write a program that reads a java source file and produce index of all identifiers in the file. use the call in.useDelimeter("[^A-Za-zO-9-J]")

  Heptadeca class that encapsulates a heptadeca number

Write a Heptadeca class that encapsulates a Heptadeca number value. A Heptadeca number is one with 17 digits: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F, G. The methods the class has are: public void read(), public void set(String), public voi..

  An issue in computer security is the concept of externality

An issue in computer security is the concept of externality. This is a term from economics. It means the cost of a decision is borne by people other than those taking the decision. For example, in the case of botnets, the 'costs' include (among..

  Determines the change to be dispensed from a vending machine

Write a program that determines the change to be dispensed from a vending machine. An item in the machine can cost between 25 cents and a dollar, in 5-cent increments(25,30,35,..90,95,100), and the machine accepts only a single dollar to pay for t..

  Discuss some of the emerging trends in information

discuss some of the emerging trends in information technology e.g. computer hardware software data analysis. what

  What is the difference between author mode and user mode

what is the difference between "author mode" and "user mode"? 2. When would you choose each

  Calculate overall return on investment of project

Calculate the overall return on investment of the project and then present a break even analysis. At what point does break-even occur?

  For this assignment we will focus on different tools and

for this assignment we will focus on the various tools and techniques available to the security professional in order

  The three components represented in that cell

Write a brief statement on how you would address the three components represented in that cell.

  Which structure would be the best for the storyboard created

He would like his recipes to be displayed in very simple, step by step pages. Which structure would be the best for the storyboard created for one of his recipes?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd