Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Discuss the different techniques with which a file can be shared among different users.
Several popular techniques with that a file can be shared among various users are:
1. Sequential sharing: In this technique of sharing, a file can be shared through only one program at a time, it is file accesses by P1 and P2 are spaced-out over time. A lock field can be utilized to implement it. Setting and re-setting of the lock at file open and close makes sure that only one program can utilize the file at any time.
2. Concurrent sharing: Some number of programs may share a file concurrently. While this is the case, this is essential to ignore mutual interference among the
m. There are three categories of concurrent sharing:
a. Immutable files: If a file is shared into immutable mode, no one of the sharing programs can modify it. Such mode has the advantage that sharing programs are independent of one more.
b. Single image immutable files: There the changes made by one program are instantly visible to other programs. The Unix file system utilizes this file- sharing mode.
c. Multiple image mutable files: There many programs can concurrently update the shared file. All updating program creates a latest version of the file that is different from the version created through concurrent programs. Such sharing mode can only be utilized in applications where the existence of multiple versions and concurrent updates are meaningful.
Explain the CCITT hierarchical structure of routing using block schematic. In right-through routing the originating exchange finds the whole route from source to destination. N
Associative Mapping: It is a more flexible mapping technique A primary memory block can be placed into any specific cache block position. Space in the cache may be
The Prisoner's Dilemma is a well-known problem in game theory. Two thieves are arrested and held in custody separately. The police offer each the same deal. Inform on your partn
What is Arithmetic and Logic Unit Arithmetic and Logic Unit: The ALU is the 'core' of any processor. It implements all arithmetic operations (addition, multiplication, subtract
Why IO devices cannot be connected directly to the system bus? Ans: The IO devices can't be directly connected to the system bus because the following reason A) The data tra
Q. Standards for scan codes ? There are 3 standards for scan codes: Mode1 (83-key keyboard PC, PC-XT) and Mode2 (84-key AT keyboard) and Mode3 (101-key keyboard onwards). In Mo
Bit Slice ALUs It was possible to manufacture smaller like 4 or 8 bits fixed point ALUs on a single IC chip. If these chips are constructed as expendable types then employing
Q. Explain the following: a) Gray code b) Parity code c) Overflow Q. Give the counting up to 30 in Base 5. Q. Convert (175.6)8 into Gray code and Excess-3 code.
What is a digital multiplexer? Ans: Multiplexer: Data selector or MUX is a logic circuit selects binary information from one of several input and directs this to a sing
What is visibility give UML notation? Visibility refers to the ability of a process to reference a feature from another class and has possible valued of public, private, protec
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd