Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1)a) Describe the concept of virtual machines. prepare a program in C to create a new process that lists the users currently logged on to the system and parent waits till the child process terminates.

b) With the help of diagrams, describe the current activities of a process when it executes and PCB of that process.

problem 2)a) Distinguish between a Process and a Thread. Describe the following threading issues to be considered in multithreaded programs:

i) fork() and exec() system calls

ii) Thread cancellation

iii) Thread pools

b) With essential diagram describe multilevel queue scheduling. For the following set of processes with the length of CPU burst time and arrival time in milliseconds is given:

1395_Process of cpu.jpg

Draw the Gantt chart and find out average waiting time, average turnaround time for Preemptive Priority scheduling algorithm.

problem 3)a) Clearly show that with the general definition of semaphores with busy waiting, the value is never negative but with spinlock may have negative semaphore values.

b) What are two methods incurred to eliminate deadlocks in a system using process termination method. Consider a system with P0 through P4 and three resource types A, B, C. Assume resource type A has 10 instances, resource type B has 5 instances and resource type C has 7 instances. Following is the Maximum and Allocation matrices to the processes:

1562_Allocation matrix.jpg

i) Check whether the system remains in safe state or not at time t=t0. Give the safe sequence.

ii) At time t1>t0, Process P4 requests additional resources ( 3 3 0). Check whether this request could be granted and safety of the system.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M96632

Have any Question? 


Related Questions in Computer Engineering

Hands-on project - honeybothoneybot is a simple honeypot

Hands-On Project - HoneyBOT HoneyBOT is a simple honeypot for beginners to use. Honeypots can give you a good idea of how many people are probing your machine for weaknesses. Without a honeypot, you may not be able to te ...

1 assume that you have 1 ss cpu how many cycles will it

1. Assume that you have 1 SS CPU. How many cycles will it take to execute these two threads? How many issue slots are wasted due to hazards? 2. Now assume you have 2 SS CPUs. How many cycles will it take to execute these ...

1 consider the statement an individual threat agent like a

1. Consider the statement: an individual threat agent, like a hacker, can be a factor in more than one threat category. If a hacker hacks into a network, copies a few files, defaces the Web page, and steals credit card n ...

Write an application that will enable you to display an

Write an application that will enable you to display an aquarium's pH level. The pH is a measure of the aquarium water's alkalinity and is typically given on a 0-14 scale. For most freshwater fish tanks, 7 is neutral. Ta ...

1 which cache design is better for each of these benchmarks

1. Which cache design is better for each of these benchmarks? Use data to support your conclusion. 2. Shared cache latency increases with the CMP size. Choose the best design if the shared cache latency doubles. Off -chi ...

Develop an algorithm fora an m x m median filter andb an m

Develop an algorithm for (a) an M x M median filter, and (b) an M x 1 separable median filter that minimizes the number of operations required for filtering N x N images, where N >> M. Compare the operation counts for M ...

In some applications particular information needs to be

In some applications, particular information needs to be retrieved from a list with a much higher frequency than other information. Under these conditions the best way to arrange the list is to put the most frequently re ...

Design and implement an algorithm that accepts as input an

Design and implement an algorithm that accepts as input an ordered list of search names. The task required is to establish and report the absence or presence of these search names in a second much longer ordered list.

1 please explain the standard file permissions in the linux

1). Please explain the Standard file permissions in the Linux. And also explain the different types of permissions. (Elaborate your Answers with examples and also run commands in the Linux machine). 2). Why chgrp & chown ...

Use the fdm to calculate the characteristic impedance of

Use the FDM to calculate the characteristic impedance of the high-frequency, air-filled rectangular transmission line

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen