Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1)a) Describe the concept of virtual machines. prepare a program in C to create a new process that lists the users currently logged on to the system and parent waits till the child process terminates.

b) With the help of diagrams, describe the current activities of a process when it executes and PCB of that process.

problem 2)a) Distinguish between a Process and a Thread. Describe the following threading issues to be considered in multithreaded programs:

i) fork() and exec() system calls

ii) Thread cancellation

iii) Thread pools

b) With essential diagram describe multilevel queue scheduling. For the following set of processes with the length of CPU burst time and arrival time in milliseconds is given:

1395_Process of cpu.jpg

Draw the Gantt chart and find out average waiting time, average turnaround time for Preemptive Priority scheduling algorithm.

problem 3)a) Clearly show that with the general definition of semaphores with busy waiting, the value is never negative but with spinlock may have negative semaphore values.

b) What are two methods incurred to eliminate deadlocks in a system using process termination method. Consider a system with P0 through P4 and three resource types A, B, C. Assume resource type A has 10 instances, resource type B has 5 instances and resource type C has 7 instances. Following is the Maximum and Allocation matrices to the processes:

1562_Allocation matrix.jpg

i) Check whether the system remains in safe state or not at time t=t0. Give the safe sequence.

ii) At time t1>t0, Process P4 requests additional resources ( 3 3 0). Check whether this request could be granted and safety of the system.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M96632

Have any Question? 


Related Questions in Computer Engineering

1 explain the advantages of ipv6 when compared to ipv42

1. Explain the advantages of IPv6 when compared to IPv4. 2. Explain the use of the flow field in IPv6. What is the potential application of this field? 3. Distinguish between compatible and mapped addresses and explain t ...

1 design and implement an iterative version of the

1. Design and implement an iterative version of the factorial function. 2. Design and implement a recursive function for determining whether a string is a palindrome. A palindrome is a string of characters that is the sa ...

1 implement a text-based version of the reversi game using

1. Implement a text-based version of the Reversi game using your game logic ADT from the previous question. 2. Define a game logic ADT, similar to that of the Reversi Game Logic ADT, for the game of checkers.

1 prove that an n x n haar transform matrix is orthogonal

1. Prove that an N x N Haar transform matrix is orthogonal and can be implemented in 0 (N) operations on an N x 1 vector. 5.21 Using the recursive formula for generating the slant transforms prove that these matrices are ...

In an 80211 network three stations a b and c are contending

In an 802.11 network, three stations (A, B, and C) are contending to access the medium. The contention window for each station has 31 slots. Station A randomly picks up the first slot; station B picks up the fifth slot; ...

1 discuss the pros and cons of shared vs private l2 caches

1. Discuss the pros and cons of shared vs. private L2 caches for both single-threaded, multi-threaded, and multi programmed workloads, and reconsider them if having on-chip L3 caches. 2. Assume both benchmarks have a bas ...

1 what is the first principle we discussed in this chapter

1. What is the first principle we discussed in this chapter for protocol layering that needs to be followed to make the communication bidirectional? 2. Explain the difference between an Internet draft and a proposed stan ...

Zonealarm is a pc-based firewall and idps tool visit the

ZoneAlarm is a PC-based firewall and IDPS tool. Visit the product manufacturer at www.zonelabs.com, and find the product specification for the IDPS features of ZoneAlarm. Which of the ZoneAlarm products offer these featu ...

Abstract data types adts are very important as they serve

Abstract data types (ADTs) are very important as they serve as programming tools that enable component reuse and encapsulation. This assignment requires students to create, implement and apply ADTs in an application.The ...

1 the dla simple model often winds up with long

1. The DLA Simple model often winds up with long, tendril-like particle traces. Why does this occur? Why does this pattern change when you make the decision to stick or not to stick probabilistically as we did in the sec ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro