Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1)a) Describe the concept of virtual machines. prepare a program in C to create a new process that lists the users currently logged on to the system and parent waits till the child process terminates.

b) With the help of diagrams, describe the current activities of a process when it executes and PCB of that process.

problem 2)a) Distinguish between a Process and a Thread. Describe the following threading issues to be considered in multithreaded programs:

i) fork() and exec() system calls

ii) Thread cancellation

iii) Thread pools

b) With essential diagram describe multilevel queue scheduling. For the following set of processes with the length of CPU burst time and arrival time in milliseconds is given:

1395_Process of cpu.jpg

Draw the Gantt chart and find out average waiting time, average turnaround time for Preemptive Priority scheduling algorithm.

problem 3)a) Clearly show that with the general definition of semaphores with busy waiting, the value is never negative but with spinlock may have negative semaphore values.

b) What are two methods incurred to eliminate deadlocks in a system using process termination method. Consider a system with P0 through P4 and three resource types A, B, C. Assume resource type A has 10 instances, resource type B has 5 instances and resource type C has 7 instances. Following is the Maximum and Allocation matrices to the processes:

1562_Allocation matrix.jpg

i) Check whether the system remains in safe state or not at time t=t0. Give the safe sequence.

ii) At time t1>t0, Process P4 requests additional resources ( 3 3 0). Check whether this request could be granted and safety of the system.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M96632

Have any Question? 


Related Questions in Computer Engineering

1 some have described social engineering as being

1. Some have described social engineering as being perpetuated by our internal fears. Discuss those fears. 2. What is the role of software security testing in the process of finding solutions to system vulnerabilities?

We have sampled a low-pass signal with a bandwidth of 200

We have sampled a low-pass signal with a bandwidth of 200 KHz using 1024 levels of quantization. a. Calculate the bit rate of the digitized signal. b. Calculate the SNRdB for this signal. c. Calculate the PCM bandwidth o ...

A request-reply protocol is implemented over a

A request-reply protocol is implemented over a communication service with omission failures to provide at-least-once RMI invocation semantics. In the first case the implementor assumes an asynchronous distributed system. ...

1 an x509 certificate revocation list contains a field

1. An X.509 certificate revocation list contains a field specifying when the next such list is expected to be issued. Why is that field present? 2. Consider the following authentication protocol, which uses a classical c ...

Database controlsbased on your research conducted earlier

Database Controls Based on your research conducted earlier in this unit, identify the types of controls that are available to mitigate some of the vulnerabilities, threats, and risks you identified in the Unit 5 discussi ...

A dual processor smp system includes an l1 data cache for

A dual processor SMP system includes an L1 data cache for each processor and employs the MESI protocol to maintain cache consistency.  Each cache is a 2-way set associative copy-back cache that contains a total of 8192 c ...

Metrics paperresearch the following topicmetricsreview nist

Metrics Paper Research the following topic: Metrics Review NIST SP 800-55 Rev. 1, Performance Measurement Guide for Information Security. Discuss measures you would be interested in finding the results, based on your hom ...

Assignment reviewing computer operations1 explain why

Assignment: Reviewing Computer Operations 1) Explain why turning off the computer by using the power switch might be harmful to the system. 2) Four medical assistants work at their own computer workstations, which are ne ...

1 calculate the mtbf for each of the devices in the table2

1. Calculate the MTBF for each of the devices in the table. 2. Calculate the availability for each of the devices in the table. 3. What happens to availability as the MTTR approaches 0? Is this a realistic situation? 4. ...

1 what is a virtual switching element2 why should a small

1. What is a virtual switching element? 2. Why should a small business opt to virtualize its computing resources? 3. In recent years, there has been a phenomenal growth in the business use of computing virtualization tec ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro