Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Question :
The file system is the most visible aspect of an operating system. It provides the mechanism for on-line storage and access to both data and programs of the operating system and to all the users of the computer system.
(a) What is a file?
(b) Many systems require and open system call and a close system call. Explain the purpose of the open and close operations.
(c) Some systems automatically open a file when it is referenced for the first time, and close the file when the job terminates. What is the advantage and disadvantage of this scheme as compared to the more traditional one, where the user has to open and close the file explicitly?
(d) Just as a file must be opened before it is used, a file system must be mounted before it can be available to processes in the system. Describe the mount procedure that is performed by the operating system.
(e) Consider a file system where a file can be deleted and its disk space reclaimed while links to that file still exists.
I. What problems may occur if a new file is created in the same storage area or with same absolute path name?
II. How can these problems be avoided?
Determine the equation for the y and truth table for the circuits
Define request edge and assignment edge. Answer: A directed edge from process Pi to resource type R j is denoted by Pi->j; it signifies that process Pi requested an instance
MDEFINE CRITICAL SECTION
TURNAROUND TIME
What are the advantages of Indexed allocation? The benefits are a. No external-fragmentation problem b. Solves the size-declaration problems. c. Supports direct access
Why is it not possible to enforce memory protection at compile time? Every process should be protected against unwanted interference by other process, whether intentional or
Write in brief on UNIX file structure. UNIX considers every file to be a sequence of 8-bit bytes no interpretation of these bits is made by the operating system. This system pr
EXPLAIN THE SCAN SHUDDULING WITH DIAGRAM
expalin about the design issues of network operating system
Q. How does the distinction among kernel mode and user mode function as a rudimentary form of protection (security) system? Answer: The distinction among kernel mode and user m
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd