Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Explain the Fork Function
Fork function causes a new process to be created. The calling progress is duplicated as an exact copy (called the child process) that differs only in process IDs and parent IDs. This function returns the chid's process ID to the parent process and a value of 0 to the child process. After that it is possible to distinguish the two process as a result to the fork () call. The child inherits many handles, IDs, and masks from the parent process. The fork is generally used in conjunction with exec () to load or spawn new process. First the fork is initiated to create a new process context, then exec () is used to overlay the child process with a new executable image. execl(execName, arg0,....) The exec family of functions changes the state of the calling process into a new process.
Once executed, exec will replace the currently executing process with one specified by execName. Optionally parameters may be passed to the newly running process as variable-number command line arguments (arg0....) This function is usually used to either replace or overlay an existing running process or in conjunction with the fork () system call to initiate a new process. Once the fork () call is initiated to copy the process, the child process may in turn exec the new process to be executed. The original process is thus still in memory and active, and the child process has become a new executable image specified by exec Name.
What are the most common schemes for defining the logical structure of a directory? The most common schemes for explaining the logical structure of a directory Single-L
Declare some Applications of Open Source Systems • Finance • Educational • Data Storage and Management • ERP (Enterprise Resource Planning) •File Sharing & FTP
Q. Explain a mechanism by which one segment could belong to the address space of two different processes. Answer: Because segment tables are a collection of base-limit register
Concept of Reentrancy It is a useful, memory-saving method for multiprogrammed timesharing machines. A Reentrant method is one in which multiple clients can share a singl
How does user specify block to be fetched in direct access? By specifying the relative block number, relative to first block in file, which is block 0.
Banker's Algorithm In this analogy Customers ≡ processes Units ≡ resources, say, tape drive Ba
Signal handling A signal is used in UNIX systems to inform a process that a particular event has occurred. 1. A signal is produced by the occurrence of a particular event.
What are the different file operations? Create : - Space for the file in the file system update directory table. Write : - file name and data to be written is
Remote IT Support Engineer Windows Systems Administrator Project Description: Need Windows base IT Support Engineer / Systems Network Administrator - perfectly MCSE qualified
LRU evicts the page which was last accessed the farthest into the past of any page resident in physical memory, i.e. the least-recently used page. LRU approximates OPT when the rec
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd