Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Does Windows XP offer any user-mode processes that enable it to run programs developed for other operating systems? Describe two of these subsystems.
Answer: Environmental subsystems are user-mode processes layered in excess of the native executable services to enable Windows XP to run programs developed for other operating systems.
(1) A Win 32 application called the virtual DOS machine (VDM) is offer as a user-mode process to run MS-DOS applications. The VDM can perform or emulate Intel 486 instructions and also provides routines to emulate MS-DOS BIOS services and provides virtual drivers for screen and keyboard and communication ports.
(2) WOW32 (Windows-on-windows) provides kernel as well as stub routines for Windows 3.1 functions. The end routines call the appropriate Win32 subroutines converting the 16-bit addresses into 32-bit addresses.
what is difference between file descriptor and file pointer?
Q. What are three benefits of dynamic (shared) linkage of libraries compared to static linkage? What are two situations where static linkage is preferable? Answer: The
define pipe
With software algorithms for mutual exclusion, such as Dekker's algorithm, Peterson's algorithm, or Lamport's bakery algorithm, note that optimizing compilers and out-of-order exec
What is the purpose of system calls? System calls permit user-level processes to request services of the operating system.
Briefly discuss on Bankers algorithm? The resource-allocation graph algorithm is not applicable to a resource-allocation system with multiple examples for each resource type.
what do obelia eat and how do they feed
We are faced with three major components of the page-fault service time. 1. Service the page-fault interrupts. 2. Read in the page. 3. Restart the processes.
How are file sharing and protection implemented? To implement file protection and sharing, the system ought to maintain more file and directory attributes than are needed on a
advantages and disadvantages of kernal level thread
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd