Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Explain the Fork Function
Fork function causes a new process to be created. The calling progress is duplicated as an exact copy (called the child process) that differs only in process IDs and parent IDs. This function returns the chid's process ID to the parent process and a value of 0 to the child process. After that it is possible to distinguish the two process as a result to the fork () call. The child inherits many handles, IDs, and masks from the parent process. The fork is generally used in conjunction with exec () to load or spawn new process. First the fork is initiated to create a new process context, then exec () is used to overlay the child process with a new executable image. execl(execName, arg0,....) The exec family of functions changes the state of the calling process into a new process.
Once executed, exec will replace the currently executing process with one specified by execName. Optionally parameters may be passed to the newly running process as variable-number command line arguments (arg0....) This function is usually used to either replace or overlay an existing running process or in conjunction with the fork () system call to initiate a new process. Once the fork () call is initiated to copy the process, the child process may in turn exec the new process to be executed. The original process is thus still in memory and active, and the child process has become a new executable image specified by exec Name.
Q. Error detection in operating system? Error detection- Error detection take places at both the hardware and software levels. At the hardware level every data transfers must b
Q. Why do several systems store the operating system in firm ware and others on disk? Answer: For certain devices such like handheld PDAs and cellular telephones a disk with
Virtual addresses are made up of two parts: the ?rst part is the page number, and the second part is an offset inside that page. Suppose our pages are 4kb (4096 = 212 bytes) long,
The performance of a file system depends upon the cache hit rate (fraction of blocks found in the cache). If it takes 1 msec to satisfy a request from the cache, but 40 msec to sat
what do obelia eat and how do they feed
Transparency Users must be able to access remote resources as though these resources were local. Transparency should as well promote user mobility. Users must be allowed
Q. The instance of handshaking used 2 bits: a busy bit as well as a command-ready bit. Is it probable to implement this handshaking with only 1 bit? If it is illustrate the protoc
What is the use of FIFOs in client-server applications
LRU page replacement In least lately used page replacement algorithm we will replace that page that hasn't been used for the longest period of time. This is similar as an opti
What is sector sparing is proper definition
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd