Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1)a) Describe the concept of virtual machines. prepare a program in C to create a new process that lists the users currently logged on to the system and parent waits till the child process terminates.

b) With the help of diagrams, describe the current activities of a process when it executes and PCB of that process.

problem 2)a) Distinguish between a Process and a Thread. Describe the following threading issues to be considered in multithreaded programs:

i) fork() and exec() system calls

ii) Thread cancellation

iii) Thread pools

b) With essential diagram describe multilevel queue scheduling. For the following set of processes with the length of CPU burst time and arrival time in milliseconds is given:

1395_Process of cpu.jpg

Draw the Gantt chart and find out average waiting time, average turnaround time for Preemptive Priority scheduling algorithm.

problem 3)a) Clearly show that with the general definition of semaphores with busy waiting, the value is never negative but with spinlock may have negative semaphore values.

b) What are two methods incurred to eliminate deadlocks in a system using process termination method. Consider a system with P0 through P4 and three resource types A, B, C. Assume resource type A has 10 instances, resource type B has 5 instances and resource type C has 7 instances. Following is the Maximum and Allocation matrices to the processes:

1562_Allocation matrix.jpg

i) Check whether the system remains in safe state or not at time t=t0. Give the safe sequence.

ii) At time t1>t0, Process P4 requests additional resources ( 3 3 0). Check whether this request could be granted and safety of the system.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M96632

Have any Question? 


Related Questions in Computer Engineering

1 in the nrl classification scheme for the genesis axis how

1. In the NRL classification scheme for the "genesis" axis, how might one determine whether a vulnerability is "malicious" or "nonmalicious"? 2. In the NRL classification scheme for the "genesis" axis, can the classes "T ...

Identify a major information security incident that has

Identify a major information security incident that has occurred in the recent past (within the last five years).  If possible, identify a breach that occurred in, or otherwise impacted, the Middle East.  Review and anal ...

You are asked to explain whether or not your organization

You are asked to explain whether or not your organization (industrial manufacturing of furniture) should pursue ISO 14001 certification for its environmental management system. Provide a summary of your recommendation, a ...

Design values and adjustment factors in the following

Design values and adjustment factors in the following problems are to be taken from the 1997 NDS. Assume wood will be used in dry-service conditions and at normal temperatures unless otherwise noted. a. Describe softwood ...

It is sometimes necessary to perform stack operations with

It is sometimes necessary to perform stack operations with variable length strings. Implement push and pop procedures that manipulate such strings stored on a stack consisting of a fixed length character array.

Verify that eulers theorem holds in zm m 69 for all

Verify that Euler's Theorem holds in Zm, m = 6,9, for all elements a for which gcd(a,m) = 1. Also verify that the theorem does not hold for elements a for which gcd(a,m) ≠ 1. For the affine cipher in Chapter 1 the multip ...

Using english text and patterns determine the average

Using English text and patterns determine the average behavior of the pattern searching algorithm in (Implement a version of the current pattern searching algorithm that counts the number of times a given pattern occurs ...

1 why is antivirus software always developed after the

1. Why is antivirus software always developed after the virus has stricken? 2. Describe the similarities between biological viruses and computer viruses. 3. What are the difficulties faced by a community that wants to fi ...

Your switched network has two catalyst 3560 switches with

Your switched network has two Catalyst 3560 switches with redundant connections. You are configuring the switches to increase available traffic bandwidth between them by actively negotiating an EtherChannel using PAgP ch ...

Given that all ascii codes are less than 128 design an

Given that all ascii codes are less than 128, design an algorithm that reads a given set of data and decides whether or not it may contain decimal data.

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen