Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem: (You might use up to two pages and single-space for this problem) Consider a skate rental shop which has two rental agents, a counter, and a waiting area which can accommodate up to four customers on a bench and gives standing room for additional patrons. By law the shop has a maximum customer capacity of 10. The rental agent fills a patrons request to rent a pair of skis. A customer can’t enter the shop if it is filled to capacity. If the previous condition is false, a customer will either take a seat on the bench or stand if the bench is full. As soon as a server is free, the customer which has been on the bench the longest is served and if any patrons are standing, the one that has been in the shop the longest takes a seat on the bench. When a pair of skates is rented, the rental agent accepts payment then serves the next patron (if one is present). Your task is to prepare a program in pseudo-code using semaphores. The rental agent is a task and each customer.

problem: Given a four level hierarchical storage system comprising of: cache, primary storage, secondary storage, and tertiary storage. Suppose the following: programs might be executed on any of the four levels; each level comprises of the same amount of real storage and the range of addresses on each level is identical. The speed at that programs are run is grouped from slowest (tertiary storage) to fastest (cache), where each layer is 10 times faster than the previous lower layer. There exists one CPU in this system, which might run one program at a time. Programs might be shuttled from any layer to any layer.

i) Why might the operating system choose to move information from a faster level to a slower level, bypassing an intermediate level, IE. from cache to secondary storage?
ii) Why would items move from a slower layer to a faster layer?
iii) Should information be allowed to move from any level to any level or should transfers only occur from adjacent levels? describe in detail.

problem: Determining the time quantum for a job is a crucial task. Given the assumptions that the average switching time between procedures is s, and the average amount of time an I/O bound procedure uses before generating an I/O request is t (t >> s). Discuss the effect of each of the following quantum settings denoted by q.

i) q = infinity
ii) q is slightly greater than zero
iii) q = s
iv) s < q < t
v) q = t
vi) q > t

problem: Dr. Zeus provided an extensive analysis of the dependability properties of operating systems. Her report included the relative value of the manageability of an operating system and a potential set of metrics which directly relate manageability to the dependability of that operating system. Unfortunately Dr. Zeus won the lottery, took off for parts unknown and in the process didn’t give her report – some say she  is writing books for children (the word on the street is that the books do not include operating system topics). Your task is to provide you’re metric for system manageability to substitute for the Zeus on the Loose Report. Be advised that Dr. Zeus produced detailed and supported work prior to her disappearance.

problem: A virtual storage system has page size p, block size b, and fixed-length record size r. Discuss the various relationships among p, b, and r that make for the most efficient system. Give a detailed account of your explanation.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9332

Have any Question? 


Related Questions in Computer Engineering

1 which fields in a log entry will be accessed for the

1. Which fields in a log entry will be accessed for the given log processing function? Assuming 64-byte cache blocks and no prefetching, how many cache misses per entry does the given function incur on average? 2. How ca ...

Database administrationword doc - 5-6 pagesfor this

Database Administration Word doc - 5-6 pages For this assignment, research different roles and responsibilities of a database administrator.  Research 3 routine tasks involved in database administration. What are they? H ...

Figure 1523 shows the frame format of the baseband layer in

Figure 15.23 shows the frame format of the baseband layer in Bluetooth (802.15). Based on this format, answer the following questions: a. What is the range of the address domain in a Bluetooth network? b. How many statio ...

Assignmentcreate a four slide powerpoint presentation in

Assignment Create a four slide PowerPoint presentation in which you: 1. Slide 1: Insert a title slide including your name, course, quarter, and professor's name. 2. Slide 2: Insert a picture of the person or of something ...

1 in sctp a packet is carrying a cookie echo message and a

1. In SCTP, a packet is carrying a COOKIE ECHO message and a DATA chunk. If the size of the cookie is 200 bytes and that of the user data is 20 bytes, what is the size of the packet? 2. In SCTP, a packet is carrying a CO ...

1 explain the benefit of autoconfiguration2 explain the

1. Explain the benefit of autoconfiguration. 2. Explain the benefit of renumbering. 3. Which field in the IPv6 packet is responsible for multiplexing and demultiplexing?

1 evaluate the four basic linked list operations for a

1. Evaluate the four basic linked list operations for a sorted doubly linked list and indicate the worst case time-complexities of each. 2. Evaluate the worst case time-complexity for the search operation on a doubly lin ...

1 why is it a good practice to delay naming specific

1. Why is it a good practice to delay naming specific individuals as resources early in the planning process? 2. What is a milestone, and why is it significant to project planning?

A different approach to fast text searching is to step

A different approach to fast text searching is to step through the text in skips equal to the word length. As soon as we get a mismatch in trying to match the word sought we skip to the start of the next word. To do this ...

Let the two primes p 41 and q 17 be given as set-up

Let the two primes p = 41 and q = 17 be given as set-up parameters for RSA. 1. Which of the parameters e1 = 32,e2 = 49 is a valid RSA exponent? Justify your choice. 2. Compute the corresponding private key Kpr = (p,q,d). ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen