Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem: (You might use up to two pages and single-space for this problem) Consider a skate rental shop which has two rental agents, a counter, and a waiting area which can accommodate up to four customers on a bench and gives standing room for additional patrons. By law the shop has a maximum customer capacity of 10. The rental agent fills a patrons request to rent a pair of skis. A customer can’t enter the shop if it is filled to capacity. If the previous condition is false, a customer will either take a seat on the bench or stand if the bench is full. As soon as a server is free, the customer which has been on the bench the longest is served and if any patrons are standing, the one that has been in the shop the longest takes a seat on the bench. When a pair of skates is rented, the rental agent accepts payment then serves the next patron (if one is present). Your task is to prepare a program in pseudo-code using semaphores. The rental agent is a task and each customer.

problem: Given a four level hierarchical storage system comprising of: cache, primary storage, secondary storage, and tertiary storage. Suppose the following: programs might be executed on any of the four levels; each level comprises of the same amount of real storage and the range of addresses on each level is identical. The speed at that programs are run is grouped from slowest (tertiary storage) to fastest (cache), where each layer is 10 times faster than the previous lower layer. There exists one CPU in this system, which might run one program at a time. Programs might be shuttled from any layer to any layer.

i) Why might the operating system choose to move information from a faster level to a slower level, bypassing an intermediate level, IE. from cache to secondary storage?
ii) Why would items move from a slower layer to a faster layer?
iii) Should information be allowed to move from any level to any level or should transfers only occur from adjacent levels? describe in detail.

problem: Determining the time quantum for a job is a crucial task. Given the assumptions that the average switching time between procedures is s, and the average amount of time an I/O bound procedure uses before generating an I/O request is t (t >> s). Discuss the effect of each of the following quantum settings denoted by q.

i) q = infinity
ii) q is slightly greater than zero
iii) q = s
iv) s < q < t
v) q = t
vi) q > t

problem: Dr. Zeus provided an extensive analysis of the dependability properties of operating systems. Her report included the relative value of the manageability of an operating system and a potential set of metrics which directly relate manageability to the dependability of that operating system. Unfortunately Dr. Zeus won the lottery, took off for parts unknown and in the process didn’t give her report – some say she  is writing books for children (the word on the street is that the books do not include operating system topics). Your task is to provide you’re metric for system manageability to substitute for the Zeus on the Loose Report. Be advised that Dr. Zeus produced detailed and supported work prior to her disappearance.

problem: A virtual storage system has page size p, block size b, and fixed-length record size r. Discuss the various relationships among p, b, and r that make for the most efficient system. Give a detailed account of your explanation.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9332

Have any Question? 


Related Questions in Computer Engineering

Consider the following rulesreachablex y - flightx

Consider the following rules: REACHABLE(X, Y) :- FLIGHT(X, Y) REACHABLE(X, Y) :- FLIGHT(X, Z), REACHABLE(Z, Y) where REACHABLE(X, Y) means that city Y can be reached from city X, and FLIGHT(X, Y) means that there is a fl ...

The leadership of gti has chosen oracleregnbspfor their

The leadership of GTI has chosen Oracle ®  for their Enterprise Application System, but some members of the leadership team are skeptical of this solution. They have asked you to provide them with a report describing the ...

1 how is an sts multiplexer different from an adddrop

1. How is an STS multiplexer different from an add/drop multiplexer since both can add signals together? 2. What is the relationship between STS signals and OC signals? 3. What is the purpose of the pointer in the line o ...

Wvcc has decided to purchase a standalone firewall reread

WVCC has decided to purchase a standalone firewall. Reread the "Improved Performance and Security for the Edge of the Network" section of the chapter to understand WVCC's requirements for the firewall. Do some Internet r ...

1 implement a new version of the gameoflifepy program to

1. Implement a new version of the gameoflife.py program to use your SparseLifeGrid class from the previous question. 2. Repeat Exercise 2.5 from Chapter 2 but use your new version of the gameoflife.py program from the pr ...

1 in a connection the value of cwnd is 3000 and the value

1. In a connection, the value of cwnd is 3000 and the value of rwnd is 5000. The host has sent 2000 bytes, which have not been acknowledged. How many more bytes can be sent? 2. A client uses TCP to send data to a server. ...

Researchnbspavailable accounting software for small medium

Research  available accounting software for small, medium, and large businesses. Create  a 3- to 4-page recommendation and include the following: Matrix listing viable accounting software options for a small, medium, and ...

1 if the processor has forwarding but we forgot to

1. If the processor has forwarding, but we forgot to implement the hazard detection unit, what happens when this code executes? 2. If there is forwarding, for the first five cycles during the execution of this code, spec ...

1 discuss the benefits of system scanning2 discuss as many

1. Discuss the benefits of system scanning. 2. Discuss as many effective ways of responding to a system intrusion as possible. What are the best? Most implementable? Most cost-effective? 3. Snort is a software-based real ...

Define the aspects of a swot analysis and how it can

Define the aspects of a SWOT analysis and how it can benefit a company.

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro