Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Explain some of the ways an application can use memory via the Win32 API.
Answer: (1) Virtual memory offers several functions that allow an application to reserve and release memory and specifying the virtual address at which the memory is allocated.
(2) A file possibly memory mapped into address space providing a means for two processes to share memory.
(3) When a Win32 procedure is initialized it is created with a default heap. Private heaps is able to be created that provide regions of reserved address space for applications. Thread management functions are offers to allocate and control thread access to private heaps.
(4) A thread-local storage mechanism offers a way for global and static data to work properly in a multithreaded environment. Thread-lock storage assign global storage on a per-thread basis.
five major activities on file management in operating system.? Explain it.?
ADVANTAGES AND INCONVENIENCES OF KLT Advantages: the kernel be able to simultaneously schedule many threads of the same process on many processors blocking
single pass assembler
What is dispatch latency? The time taken by the dispatcher to stop one process and begin another running is known as dispatch latency.
A paper mill produces two grades of paper viz., X and Y. Because of raw material restrictions, it cannot produce more than 400 tons of grade X paper and 300 tons of grade Y paper i
Why is it not possible to enforce memory protection at compile time? Every process should be protected against unwanted interference by other process, whether intentional or
Virtual addresses are made up of two parts: the ?rst part is the page number, and the second part is an offset inside that page. Suppose our pages are 4kb (4096 = 212 bytes) long,
Define Segmentation The memory allocation method subject to “external” fragmentation is Segmentation.
Consider a scenario of post mailbox, there are two processes named sender S and receiver R. Both processes can communicate with each other by name along with message. You need to I
list trhe various classification of model and types?
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd