Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
What are the necessary conditions for deadlocks?
1.Mutual exclusion: Only one process at a time is able to use the resource.
2.Hold and wait: A process should be holding at least one resource and waiting to acquire additional resources that are currently being held by other processes.
3.No preemption: Resource cannot be preempted that is, a resource is able to be released only voluntarily by the process holding it, subsequent to that process has completed its task.
4.Circular wait:A set {p0,p1,.........,pn} of waiting processes should exit such that p0 is waiting for a resource that is held by p1 and p1 is waiting for a resource that is held by p2,.........,pn-1 is waiting for a resource that is held by pn, and pn is waiting for a resource that is held by p0.
basic advantage of using interrupt initiated data transfer over transfer under program control without an interrupt
How is memory management done using bit maps? A bit map is here in this we signify the bit value as 0 or 1. 1-hole 0-process In this we are able to represent the proce
Q. List three instances of deadlocks that aren't related to a computer system environment. Answer: Two cars passage a single-lane bridge from opposite directions.
What are the system components of an operating system and explain them? a) Process management b) Main-memory management c) I/O management d) File management e) Seco
What are the objectives for a file management system? To meet the data management wants and requirements of the user, which embrace storage of data and the ability to
A set of methods that allow executing a program which is not completely in memory is called A set of methods that allow executing a program which is not completely in memory
When do we write a page from physical memory back to the disk? In general, caches have two broad types of writing policies. One approach is a write-through cache. In this case,
Q. How is the NTFS namespace planned? Explain. Answer: The NTFS namespace is prearranged as a hierarchy of directories where every directory uses a B+ tree data structure to
short note on context switching
What are the three main activities of an operating system in regard to secondary-storage management? a) Free-space management. b) Storage allocation. c) Disk scheduling.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd