Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
What is an I/O buffer? What is the advantage of buffering? Is buffering always effective? Justify your answer with help of an example.
One type of I/O requirement arises from devices which have a very high character density like tapes and disks. With these attributes, it is not possible to regulate communication along with devices on a character-by-character basis. Hence, the information transfer is regulated in blocks of information. In addition, sometimes this may need some type of format control to structure the information to suit the device and/or data characteristics. For example, a disk drive is different from a line printer or an image scanner.
For each of these devices, the format and structure of information is dissimilar. It should be examined that the rate at which a device may offer data and the rates at which an end application may consume it might be significantly different. In place of these differences, the OS should offer uniform and easy to use I/O mechanisms. Generally, this is done by providing an I/O buffer. The OS manages this buffer thus as to be able to comply with the requirements of both the producer and consumer of data. Essentially, the buffers absorb mismatch in the data transfer rates of processor or memory on one side and device on the other.
Explain Debug monitors. Debug monitors give debugging support for a program. A debug monitor executes the program being debugged in its own control thereby giving execution e
Q. Example to show directory in doc? Like a file name, the directory name may also have up to eight alpha-numeric characters. The directory name can also have an extension
Prolog: Still we can take our card game from the previous lecture like a case study for the implementation of a logic-based expert system. So there the rules were: four cards
The hybrid models are mostly tailormade models suiting to exact applications. Actually these fall in the category of mixed models. Such type of application-oriented models keep cro
What is .NET / .NET Framework? It is a Framework in which Windows applications might be developed and run. The Microsoft .NET Framework is a platform for building, deploying,
Vector-Scalar Instructions In this category, when combination of vector and scalar are fetched and stored in vector register. These instructions are referred with the subsequen
How can we set the table spaces and extent sizes? You can state the extent sizes and the table space (physical storage area in the database) in which a transparent table is to
en a five station token bus LAN with station addresses of 3000, 500, 100, 70, and 50. Stations with addresses of 5000, 4000, 400, 90, and 60 are waiting to enter the ring. Assume a
Q. What is Shadow Mask? Shadow Mask is a metal sheet that has fine perforations (holes) in it and is situated a short distance before phosphor coated screen. The Phosphor dots
Q. Explain working of D Flip -Flop? D (data) flip-flop is modification of RS flip-flop. Problem of undefined output in SR flip-flop when both R and S become 1 gets avoided in D
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd