Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Differentiate between Batch Operating System and Time Sharing Operating System?
Batch operating systems: A batch is a sequence of jobs. Such batch is submitted to batch processing operating systems moreover output would show some later time in the form of a program or like program error. For speed-up processing same jobs are batched together. The main task of batch operating systems is to transfer control automatically from one job to next. Now there the operating is always in the memory.
(i) This is lack of interaction between job and user while executing
(ii) Turnaround time is more.
(iii) CPU is often idle; due to 1/0 devices are very slow.
Time sharing: It is also called as multi tasking, is a logical execution of multiprogramming. Multiple jobs are executed through the CPU switching among them. Now there the computer system gives on line communication in between the user and the system.
Now there the CPU is never idle. Time shared operating system permits many users to share the computer concurrently.
Time sharing systems needs some sort of memory protection and management.
Illustrate what is pascal's principle? Answer:- Pascal's Principle declares that the pressure is transmitted evenly through a liquid. That's why when you pump up a balloon
Q. Explain Execution-modes of a multiprocessor? Execution-modes of a multiprocessor: Several modes of multiprocessing comprise parallel execution of programs at (i) Fine Grain
Define cache line. Cache block is used to refer to a set of contiguous address location of some size. Cache block is also referred to as cache line.
Question 1: a. Give NINE general properties of an MIS b. Name and explain the THREE main Problems and Issues of EIS Question 2: a. What are information systems for?
Define the Firewall Design Policy A lower-level policy that describes how the firewall will handle prevention of access and filtering of services as defined in the above net
4-variable K-maps have 16 squares which arearranged in 4 columns and 4 rows. Columns and rows are labeled with 2 variables. The rows are arranged so that C or D ch
In a particular exchange during busy hour 1200 calls were offered to a group of trunks, during this time 6 calls were lost. The average call duration being 3 minutes Calculate
Search mechanisms in Prolog: Here we can needs this simple Prolog program to describe how Prolog searches as:president(X) :- first_name(X, georgedubya), second_name(X, bush).
Explain the Executing Requests Using a Message-Passing Architecture Executing requests using a message-passing architecture requires good fundamental client-server programming
Ferroelectric RAM is a random-access memory same in construction to DRAM but uses a ferroelectric layer rather of a dielectric layer to achieve non-volatility. FeRAM is one of a gr
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd