Transfers control to the operating system

Assignment Help Basic Computer Science
Reference no: EM13972112

1. When an interrupt or a system call transfers control to the operating system, a kernel stack area separate from the stack of the interrupted process is generally used. Why?

2. A computer system has enough room to hold five programs in its main memory. These programs are idle waiting for I/O half the time. What fraction of the CPU time is wasted?

3. A computer has 4 GB of RAM of which the operating system occupies 512 MB. The processes are all 256 MB (for simplicity) and have the same characteristics. If the goal is 99% CPU utilization, what is the maximum I/O wait that can be tolerated?

Reference no: EM13972112

Questions Cloud

Forecasts of the company year-end inventory turnover ratio : Jasper Furnishings has $275 million in sales. The company expects that its sales will increase 10% this year. Jasper's CFO uses a simple linear regression to forecast the company's inventory level for a given level of projected sales. What are your f..
What will be the cpu utilization : Consider a multiprogrammed system with degree of 6 (i.e., six programs in memory at the same time). Assume that each process spends 40% of its time waiting for I/O. What will be the CPU utilization?
About the excess capacity : Walter Industries has $8 billion in sales and $2 billion in fixed assets. Currently, the company's fixed assets are operating at 90% of capacity. What level of sales could Walter Industries have obtained if it had been operating at full capacity? Wri..
Monetary-non-monetary-temporal and current rate methods : Assume that General Electric (GE)’s current assets are $401 billion, fixed assets are $797 billion, current liabilities are $323 billion, and long-term liabilities are zero. Calculate GE’s translation exposure using current/non-current, monetary/non-..
Transfers control to the operating system : When an interrupt or a system call transfers control to the operating system, a kernel stack area separate from the stack of the interrupted process is generally used. Why?
What happens to the break even if a trade off : What happens to the break-even if a trade-off is made that increases fixed costs by $30,000 and decreases variable costs to 55% of sales? Assuming the project is going to last 6 years, and opportunity cost of capital is 9%
Find a zero coupon bond with a par value : You find a zero coupon bond with a par value of $10,0000 and 17 years to maturity. If the yield to maturity on this bond is 4.9%, what is the price of the bond? Assume semiannual compounding periods.
Interpret the contents of a unix : Examine and try to interpret the contents of a UNIX-like or Windows directory with a tool like the UNIX od program. (Hint: How you do this will depend upon what the OS allows.
What must the coupon rate be at on the bonds : Essary Enterprises has bonds on the market making annual payments, with eight years to maturity, a par value of $1000, selling at $948. At this price, the bonds yield 5.9%. What must the coupon rate be at on the bonds?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Essential you develop factual and logical arguments

The purpose of this assignment is to conduct a feasibility study and report whether it would be wiser to implement ERP systems in SMEs. You need to think about what are the critical success factors, has any one conducted feasibility studies for a..

  How cost of box is evaluated in lookup table

Cost of box is determined by looking up value in a lookup table. Shipping cost also is determined by looking up value in a lookup table. Use table at cells H23:J28 with a VLOOKUP function to determine cost of a box.

  Local telephone calls and long distance telephone calls

Will the distinction between local telephone calls and long distance telephone calls ever disappear? What may cause this to happen?

  A deck of cards consists of several card pairs

In the game of Memory, a deck of cards consists of several card pairs that have the same image. Cards are laid on the table face down in a grid and 2 players alternate in turning over two cards with the goal of finding a matching pair. The player wit..

  Computer crimes directions

Computer Crimes Directions: Using the internet, research a specific case of a computer crime where a person was prosecuted for committing a computer crime. Write an essay about this crime. Your essay should include the following:Explain the computer ..

  Business and it goals and mission statement

Business and IT Goals and Mission Statement

  Show how mips can implement the instruction swap

Show how MIPS can implement the instruction swap $rs $rt, which swaps the contents of registers $rs and $rt. Consider the case in which there is an available register.

  Explain to the organization the potential threats

Explain to the organization the potential threats in their software environments. Describe the various protection efforts available against each threat.

  What is the network address of the first network

Using slash notation, what is the network address of the first network?

  The information technology (it) manager

The information technology (IT) manager

  What is the project scope and what is scope creep

What is the project scope? What is scope creep? Why does it pose such a risk to the project and project manager?

  A first order analog low pass butterworth filter

Need some help with this question, do not understand how to do it. A first order analog low pass Butterworth filter has a -3dB frequency of 2.5kHz and a DC gain of unity. a. Use a bilinear transformation to find a digital filter H(z) to match the an..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd