Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem: (You might use up to two pages and single-space for this problem) Consider a skate rental shop which has two rental agents, a counter, and a waiting area which can accommodate up to four customers on a bench and gives standing room for additional patrons. By law the shop has a maximum customer capacity of 10. The rental agent fills a patrons request to rent a pair of skis. A customer can’t enter the shop if it is filled to capacity. If the previous condition is false, a customer will either take a seat on the bench or stand if the bench is full. As soon as a server is free, the customer which has been on the bench the longest is served and if any patrons are standing, the one that has been in the shop the longest takes a seat on the bench. When a pair of skates is rented, the rental agent accepts payment then serves the next patron (if one is present). Your task is to prepare a program in pseudo-code using semaphores. The rental agent is a task and each customer.

problem: Given a four level hierarchical storage system comprising of: cache, primary storage, secondary storage, and tertiary storage. Suppose the following: programs might be executed on any of the four levels; each level comprises of the same amount of real storage and the range of addresses on each level is identical. The speed at that programs are run is grouped from slowest (tertiary storage) to fastest (cache), where each layer is 10 times faster than the previous lower layer. There exists one CPU in this system, which might run one program at a time. Programs might be shuttled from any layer to any layer.

i) Why might the operating system choose to move information from a faster level to a slower level, bypassing an intermediate level, IE. from cache to secondary storage?
ii) Why would items move from a slower layer to a faster layer?
iii) Should information be allowed to move from any level to any level or should transfers only occur from adjacent levels? describe in detail.

problem: Determining the time quantum for a job is a crucial task. Given the assumptions that the average switching time between procedures is s, and the average amount of time an I/O bound procedure uses before generating an I/O request is t (t >> s). Discuss the effect of each of the following quantum settings denoted by q.

i) q = infinity
ii) q is slightly greater than zero
iii) q = s
iv) s < q < t
v) q = t
vi) q > t

problem: Dr. Zeus provided an extensive analysis of the dependability properties of operating systems. Her report included the relative value of the manageability of an operating system and a potential set of metrics which directly relate manageability to the dependability of that operating system. Unfortunately Dr. Zeus won the lottery, took off for parts unknown and in the process didn’t give her report – some say she  is writing books for children (the word on the street is that the books do not include operating system topics). Your task is to provide you’re metric for system manageability to substitute for the Zeus on the Loose Report. Be advised that Dr. Zeus produced detailed and supported work prior to her disappearance.

problem: A virtual storage system has page size p, block size b, and fixed-length record size r. Discuss the various relationships among p, b, and r that make for the most efficient system. Give a detailed account of your explanation.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9332

Have any Question? 


Related Questions in Computer Engineering

Write a gui application for the webbuy company that allows

Write a GUI application for the WebBuy Company that allows a user to compose the three parts of a complete email message: the "To:", "Subject:" and "Message:" text. The "To:", and "Subject:" Text areas should provide a s ...

1 what is the difference between the paintcomponent and

1. What is the difference between the paintComponent and repaint methods? 2. What is the difference between a frame and a panel? 3. Have the Die class of Chapter 6 implement the Measurable interface. Generate dice, cast ...

1 udp is a message-oriented protocol tcp is a byte-oriented

1. UDP is a message-oriented protocol. TCP is a byte-oriented protocol. If an application needs to protect the boundaries of its message, which protocol should be used, UDP or TCP? 2. Assume a private internet, which use ...

Compute the first two output bytes of the lfsr of degree 8

Compute the first two output bytes of the LFSR of degree 8 and the feedback polynomial from Table 2.3 where the initialization vector has the value FF in hexadecimal notation.

Docking percolation and fire often when looking at the fire

Docking percolation and fire Often when looking at the Fire model we ask what density of trees is necessary to reach the right side of the screen. We can ask the same question about the porosity value in the Percolation ...

What does describe the overall impact of utilizing

What does "Describe the overall impact of utilizing information technologies in combatting digital crime and digital terrorism mean?

1 discuss four access methods giving the weaknesses of

1. Discuss four access methods, giving the weaknesses of each. 2. Discuss the many ways in which access can be abused. 3. Is it possible to implement full distributed authorization? What will be involved? 4. Web authoriz ...

A noted computer security expert has said that without

A noted computer security expert has said that without integrity, no system can provide confidentiality. a. Do you agree? Justify your answer. b. Can a system provide integrity without confidentiality? Again, justify you ...

The random class implements a random number generator which

The Random class implements a random number generator, which produces sequences of numbers that appear to be random. To generate random integers, you construct an object of the Random class, and then apply the nextInt me ...

1 although we discussed several sources of security threats

1. Although we discussed several sources of security threats, we did not exhaust all. There are many such sources. Name and discuss five. 2. We pointed out that the design philosophy of the Internet infrastructure was pa ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen