Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem: (You might use up to two pages and single-space for this problem) Consider a skate rental shop which has two rental agents, a counter, and a waiting area which can accommodate up to four customers on a bench and gives standing room for additional patrons. By law the shop has a maximum customer capacity of 10. The rental agent fills a patrons request to rent a pair of skis. A customer can’t enter the shop if it is filled to capacity. If the previous condition is false, a customer will either take a seat on the bench or stand if the bench is full. As soon as a server is free, the customer which has been on the bench the longest is served and if any patrons are standing, the one that has been in the shop the longest takes a seat on the bench. When a pair of skates is rented, the rental agent accepts payment then serves the next patron (if one is present). Your task is to prepare a program in pseudo-code using semaphores. The rental agent is a task and each customer.

problem: Given a four level hierarchical storage system comprising of: cache, primary storage, secondary storage, and tertiary storage. Suppose the following: programs might be executed on any of the four levels; each level comprises of the same amount of real storage and the range of addresses on each level is identical. The speed at that programs are run is grouped from slowest (tertiary storage) to fastest (cache), where each layer is 10 times faster than the previous lower layer. There exists one CPU in this system, which might run one program at a time. Programs might be shuttled from any layer to any layer.

i) Why might the operating system choose to move information from a faster level to a slower level, bypassing an intermediate level, IE. from cache to secondary storage?
ii) Why would items move from a slower layer to a faster layer?
iii) Should information be allowed to move from any level to any level or should transfers only occur from adjacent levels? describe in detail.

problem: Determining the time quantum for a job is a crucial task. Given the assumptions that the average switching time between procedures is s, and the average amount of time an I/O bound procedure uses before generating an I/O request is t (t >> s). Discuss the effect of each of the following quantum settings denoted by q.

i) q = infinity
ii) q is slightly greater than zero
iii) q = s
iv) s < q < t
v) q = t
vi) q > t

problem: Dr. Zeus provided an extensive analysis of the dependability properties of operating systems. Her report included the relative value of the manageability of an operating system and a potential set of metrics which directly relate manageability to the dependability of that operating system. Unfortunately Dr. Zeus won the lottery, took off for parts unknown and in the process didn’t give her report – some say she  is writing books for children (the word on the street is that the books do not include operating system topics). Your task is to provide you’re metric for system manageability to substitute for the Zeus on the Loose Report. Be advised that Dr. Zeus produced detailed and supported work prior to her disappearance.

problem: A virtual storage system has page size p, block size b, and fixed-length record size r. Discuss the various relationships among p, b, and r that make for the most efficient system. Give a detailed account of your explanation.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9332

Have any Question? 


Related Questions in Computer Engineering

1 write a regular expression that finds all the words in a

1. Write a regular expression that finds all the words in a string that contain double letters, such as "deep" and "book". 2. Write a regular expression that finds all the header tags (, , etc.) in a Web page. 3. Write a ...

1 using the cidr notation show the link local address in

1. Using the CIDR notation, show the link local address in which the node identifier is 0::123/48. 2. Using the CIDR notation, show the site local address in which the node identifier is 0::123/48. 3. An IPv6 packet cons ...

Fisch white and pooch 353 define four levels of log

Fisch, White, and Pooch [353] define four levels of log sanitization. a. Simple sanitization, in which all information except the commands issued by an intruder are deleted b. Information-tracking sanitization, in which ...

1 there are evaluated computer products on the market find

1. There are evaluated computer products on the market. Find out how one finds out whether a computer product has a security evaluation. 2. If you have a computer product, how do you get it evaluated? Does the evaluation ...

1 you know that the domain name of a computer is

1. You know that the domain name of a computer is "aBusiness.com". Write a statement in Java to create an InetAddress object associated with that computer. 2. You know that the IP address of a computer is "23.14.76.44". ...

1 are idss similar to fi rewalls2 why are system intrusions

1. Are IDSs similar to fi rewalls? 2. Why are system intrusions dangerous? 3. Discuss the best approaches to implementing an effective IDS. 4. Can system intrusions be stopped? Support your response.

Assignmentcomp software apps healthcaremedical practice

Assignment Comp Software Apps Healthcare Medical Practice Management Software Assignment: 1. List the advantages of computerization of the medical office 2. List the disadvantages of computerization of the medical office ...

Repeat prob 91-8 using the complex signalprob 91-8consider

Repeat Prob. 9.1-8 using the complex signal Prob. 9.1-8 Consider a complex signal composed of a dc term and two complex exponentials Plot each N-point DFT as a function of frequency fk = k/N. (a) Compute and plot the DFT ...

Give an outline of the server implementation showing how

Give an outline of the server implementation showing how the operations getRequest and sendReply are used by a server that creates a new thread to execute each client request. Indicate how the server will copy the reques ...

Capture network traffic while accessing a website with your

Capture network traffic while accessing a website with your web browser. In Wireshark, go to Statistics > HTTP > Packet Counter >Create Stat. How many Response Packets did you capture? What types of Response Packets and ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen