Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
What is an I/O buffer? What is the advantage of buffering? Is buffering always effective? Justify your answer with help of an example.
One type of I/O requirement arises from devices which have a very high character density like tapes and disks. With these attributes, it is not possible to regulate communication along with devices on a character-by-character basis. Hence, the information transfer is regulated in blocks of information. In addition, sometimes this may need some type of format control to structure the information to suit the device and/or data characteristics. For example, a disk drive is different from a line printer or an image scanner.
For each of these devices, the format and structure of information is dissimilar. It should be examined that the rate at which a device may offer data and the rates at which an end application may consume it might be significantly different. In place of these differences, the OS should offer uniform and easy to use I/O mechanisms. Generally, this is done by providing an I/O buffer. The OS manages this buffer thus as to be able to comply with the requirements of both the producer and consumer of data. Essentially, the buffers absorb mismatch in the data transfer rates of processor or memory on one side and device on the other.
Q. What is Sun and Nis Law? The Sun and Ni's Law is a simplification of Amdahl's Law and Gustafson's Law. The basic concept underlying Sun and Ni's Law is to find solution to a
Encapsulation of OOA Encapsulation separates the interface of an abstraction from its implementation. By taking the above example i.e. of a car, we can now categorize them as:
Enumerate about the Specialised hardware Specialised hardware such as protected memory or cryptographic memory module for storing and protecting the keys proves to be a good s
Explain non-adapting routing. Systems which do not implement adaptive routing are explained as using non-adapting or static routing, which routes by a network are explained by
Massively Parallel System Indicates to a "parallel computer system" involving a huge number of processors. The numbers in a huge number of processors keeps increasing and curre
Explain Shadow Copy Scheme in detail.
A COCOMO model is :- COCOMO:- Constructive Cost Estimation Model.
Diiference between ROM and PROM. ROM: It also called Read Only Memory is a Permanent Memory. The data is permanently stored and cannot be changed in Permanent ROM. This can o
Q. Show Network Topology in digital system? This deals with the geometrical arrangement of nodes (endpoints consisting of physical devices such as terminals, printers, PCs, and
Explain the E-cheques verses Credit Cards in brief. E-cheques: E-cheques are utilized for business dealing into e-commerce. Transactions of such cheques take place onto Inter
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd