How many 512 byte blocks are required to store a 1.6mb file

Assignment Help Operating System
Reference no: EM13945809

1. Suppose that the keyboard device stored keystrokes in a buffer until it was full then sent the entire buffer for processing. What would be some adverse consequences? (Two or three sentences should be adequate to answer this question)

2. Suppose that all programs in a particular CPU are given 50 clock cycles to process before getting swapped out for another program. Suppose also, that it takes 5 CPU clock cycles to swap out the process control block (PCB) for a particular program and restore the next program's PCB. What percent of the CPU clock cycles are used for processing 100 programs? (Hint: calculate: Program clock cycles / (Swap clock cycles + Program clock cycles)). Show your work and how you arrived at the solution.

3. How many 512 byte blocks are required to store a 1.6MB file?

4. Perform the Round-Robin dispatch algorithm, with time quantum equal to 300 milliseconds, on the job queue and calculate:

Job 1 arrives at time 0 and needs 500 milliseconds to complete.
Job 2 arrives at time 300 milliseconds and needs 400 milliseconds to complete.
Job 3 arrives at time 400 milliseconds and needs 200 milliseconds to complete.
Job 4 arrives at time 400 milliseconds and needs 500 milliseconds to complete.

a. The average wait time. (Hint: average the number milliseconds each job was in a wait state)

b. Average turn-around-time. (Hint: for each job, count the number of milliseconds from arrival to completion and average)

Reference no: EM13945809

Questions Cloud

Find risk premium and actuarially fair insurance premium : Suppose the insurance company is unable to distinguish between the riskiness of Lewis and Martin. What would the actuarially fair premium be if the government required them to buy the insurance? (Liability insurance is often required for certain en..
Whose narrative tone is critical of leonardo contributions : View the video, "The Mona Lisa - Every Picture Tells a Story", produced by the BBC Chanel 5, whose narrative tone is critical of Leonardo's contributions. Then submit a minimum 150 word response that addresses the main ideas and themes
Describe protocols at the different layers of the osi model : Describe protocols at the different layers of the OSI model and explain their functionality
Advantages of using this equalization preamplifier : The purpose of this lab is to allow students with the opportunity to pull from all of the concepts presented in the course and be able to construct a circuit for a real time industry application. This lab will showcase all that was learned in the ..
How many 512 byte blocks are required to store a 1.6mb file : Suppose that the keyboard device stored keystrokes in a buffer until it was full then sent the entire buffer for processing. What would be some adverse consequences?
What is strategic equilibrium quantity of the public good : Claim: as the slope of the MB curve gets steeper, the difference between the strategic equilibrium and the socially optimal quantity increases. Agree or disagree. How do the formulas help you answer the question? In words briefly explain the econom..
How does the employer promote its fringe benefit : How does the employer promote its fringe benefit and cafeteria plan packages? Compare and contrast several such sites.
Calculate the values for all resistors : Design an 8-Bit DAC Circuit - Calculate the values for all resistors 2. Include calculations and schematic in a Word document
How the integration would affect serbia growth path : Using the IS-MP-IRP framework, examine the effects of an expansionary fiscal policy (e.g. an increase in public spending (G) under a fixed and under a flexible exchange rate regime.

Reviews

Write a Review

Operating System Questions & Answers

  Network security case study

In this case study, you require to construct a network checklist to establish certain process that enable you and other network security specialists to assess a network from different possible threats and vulnerabilities.

  Identity top level objects of the microwave

Construct a table with the following four column headings, Top Level Objects, Communicates With, Incoming Messages, and Outgoing Messages and Identity top level objects of the microwave.

  How can the size of a dbms be one of its disadvantage

What is a DBA? What kinds of things does a DBA do in a database environment?

  Explain the role of determining the speed of a computer

§ Convenience and quality of output are important. Explain what method of output would be best for each of the following situations and explain why

  When a process creates a new process using the fork command

When a process creates a new process using the fork command, which of the subsequent is shared between the parent process and the child process?

  File systems on linux vs. ntfs file systems

List what characters are absolutely not allowed for ext4 file systems on Linux vs. NTFS file systems on Windows in a plain text document.

  Describe the ongoing maintenance that will be required

Describe all the necessary equipment and explain the costs involved in the creation of the system and describe the ongoing maintenance that will be required

  Question about affiliate programs

Many companies are using affiliate programs to drive traffic to their Web sites. explain what an affiliate program is and how it works.

  Shared data problem what is shared data problem explain in

what is shared data problem ? explain in briefly ? which is related to embedded system topics ? ltbrgt

  The pros and cons of first-fit and best-fit algorithms

Prepare a presentation where you discuss the different dynamic storage allocation algorithms, First-fit, Best-fit, and Worst-fit. Include the pros and cons of each algorithm?

  Assignment on functional modeling

Create a use-case diagram to include at least three (3) actors for the system described in this case through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution ..

  State the proper syntax needed to configure the routers

Given the physical topology below, state the proper syntax needed to configure the routers and the computers included in the topology.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd