Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

Directions: Include your name and answer all the problems in a Word or PDF document that is double-spaced, 12-point font, with no more than one page per problem comprising any subparts.

problem 1: How is reliability enhanced with the microkernel approach to system design?

problem 2: In a virtual machine design where guest operating systems are independent virtual machines supported by a host operating system, what factors are involved in choosing the host operating system?

problem 3: describe an advantage and disadvantage of maintaining a list of blocked processes in priority order.

problem 4: What must a kernel provide for an effective user-level thread implementation?

problem 5: With respect to the quantum q in a scheduling algorithm, describe and discuss the impact of the following on the operating system:

a) q is fixed and identical for all users.
b) q is fixed and unique to each user.
c) q is variable and identical for all users.
d) q is variable and unique to a each user.

problem 6: Arrange the above schemes in problem 5 from lowest to highest run-time overhead. describe your answer.

problem 7: Arrange the above schemes in problem 5 from least to most responsive to variations in individual processes and system load. describe you answer.

problem 8: Gopher Gallery consists of a shopping mall and a cart ride that covers the 150 acre habitat. There are m visitors and n single-person vehicles. Visitors stroll around the mall at their leisure, then line up for the cart ride. When a cart is available, a single passenger may climb aboard and drive around the habitat for a random amount of time. If the n carts are all taken, then a future rider waits; if a vehicle is available but no one is waiting, then the vehicle waits. The solution to this problem must synchronize visitor tasks and vehicle tasks using semaphores.  Below is a potential solution for the Visitor and Vehicle portions (assume that other portions of the system admit the tasks to the system). Correct any issues with this code, if any exist.  describe your position in detail.

Semaphore vehicleAvailable = 0, vehicleTaken = 0, vehicleFilled = 0, 
visitorReleased = 0;
 
Visitor()  
{
vehicleAvailable.wait();
vehicleTaken.signal();
vehicleFilled.wait();
visitorReleased.wait();
}
Vehicle()
{
while(True)
{
vehicleAvailable.signal();
vehicleTaken.wait();
vehicleFilled.signal();
Drive through habitat for some arbitrary amount of time;
visitorReleased.signal();
}
}

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9370

Have any Question? 


Related Questions in Computer Engineering

Write a deletion method for the avltree class that utilizes

Write a deletion method for the AVLTree class that utilizes lazy deletion. There are several techniques you can use, but a simple one is to simply add a Boolean field to the Node class that signifies whether or not the n ...

1 rewrite the longest common substring code as a class2

1. Rewrite the longest common substring code as a class. 2. Write a program that uses a brute force technique to find the longest common substring. Use the Timing class to compare the brute force method with the dynamic ...

The cost to become a member of a fitness center is as

The cost to become a member of a fitness center is as follows: The senior citizens discount is 30% If the membership is bought and paid for 12 or more months, the discount is 15% If more than five personal training sessi ...

Write a 3 page paper discuss why hci human computer

Write a 3 page paper discuss why HCI (Human computer Interaction) is important and has evolved to ensure that the needs of different kinds of users are taken into account in computer systems. Discuss the application of s ...

1 what drawbacks to symmetric and asymmetric encryption are

1. What drawbacks to symmetric and asymmetric encryption are resolved by using a hybrid method like Diffie Hellman? 2. What is steganography, and what can it be used for? 3. Which security protocols are predominantly use ...

1 does the recursive implementation of the binary search

1. Does the recursive implementation of the binary search algorithm from Listing 2. exhibit tail recursion? If not, why not? 3. Determine the worst case run time of the recursive exponential function exp(). 4. Determine ...

Read the scenario carefully and then discuss how the

Read the scenario carefully and then discuss how the concepts of confidentiality, integrity, and availability relate to the value of each asset. For example, the school would normally have the student's health records. W ...

Repeat problem p16-9 for is-95problem p16-9find the

Repeat Problem P16-9 for IS-95. Problem P16-9 Find the efficiency of AMPS in terms of simultaneous calls per megahertz of bandwidth. In other words, find the number of calls that can be used in 1-MHz bandwidth allocation ...

1 discuss the risks to the protected internal network as a

1. Discuss the risks to the protected internal network as a result of a DMZ. 2. What is a bastion router? How different is it from a firewall? 3. Search and discuss as many services and protocols as possible offered by a ...

Write and test a program that extracts postfix expressions

Write and test a program that extracts postfix expressions from the user, evaluates the expression, and prints the results. You may require that the user enter numeric values along with the operators and that each compon ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen