Total of 670 Questions.     




Share To Friends Via:
        

Questions Categories:



1.   In a real-time system with a periodic task set,, how are priorities assigned to each of the periodic tasks? (Answered)
In a real-time system with a periodic task set,, how are priorities assigned to each of the periodic tasks? .
Posted On:Mon 6, June 2022 06:55:29 am
2.   The traditional UNIX scheduler is a priority-based round robin scheduler (also called a multi-level round robin schduler). How does the scheduler go about favouring I/O bound jobs over long-running CPU-bound jobs? (Answered)
The traditional UNIX scheduler is a priority-based round robin scheduler (also called a multi-level round robin schduler). How does the scheduler go about favouring I/O bound jobs over long-running CPU-bound jobs? .
Posted On:Mon 6, June 2022 06:54:50 am
3.   Describe round robin scheduling. What is the parameter associated with the scheduler? What is the issue in chosing the parameter (Answered)
Describe round robin scheduling. What is the parameter associated with the scheduler? What is the issue in chosing the parameter .
Posted On:Mon 6, June 2022 06:54:12 am
4.   What is the difference between preemptive scheduling and non-preemptive scheduling? What is the issue with the latter? (Answered)
What is the difference between preemptive scheduling and non-preemptive scheduling? What is the issue with the latter? .
Posted On:Mon 6, June 2022 06:53:23 am
5.   Why is it generally correct to favour I/O bound processes over CPU-bound processes? (Answered)
Why is it generally correct to favour I/O bound processes over CPU-bound processes? .
Posted On:Mon 6, June 2022 06:52:40 am
6.   Name four disk-arm scheduling algorithms. Outline the basic algorithm for each. (Answered)
Name four disk-arm scheduling algorithms. Outline the basic algorithm for each. .
Posted On:Mon 6, June 2022 06:51:27 am
7.   What is disk interleaving? What problem is it trying to solve? (Answered)
What is disk interleaving? What problem is it trying to solve? .
Posted On:Mon 6, June 2022 06:49:24 am
8.   Explain how the producer-consumer problem is relevant to operating system I/O. (Answered)
Explain how the producer-consumer problem is relevant to operating system I/O. .
Posted On:Mon 6, June 2022 06:48:38 am
9.   Compare I/O based on polling with interrupt-driven I/O. In what situation would you favour one technique over the other? (Answered)
Compare I/O based on polling with interrupt-driven I/O. In what situation would you favour one technique over the other? .
Posted On:Mon 6, June 2022 06:48:03 am
10.   Device controllers are generally becoming more complex in the functionality they provide (e.g. think about the difference between implementing a serial port with a flip-flop controlled by the CPU and a multi-gigabit network adapter with the TCP/IP stack on the card itself). What effect might this have on the operating system and system performance? (Answered)
Device controllers are generally becoming more complex in the functionality they provide (e.g. think about the difference between implementing a serial port with a flip-flop controlled by the CPU and a multi-gigabit network adapter with the TCP/IP stack on the card itself). What effect might this have on the operating system and system performance? .
Posted On:Mon 6, June 2022 06:47:03 am
11.   Describe buffering in the I/O subsystem of an operating system. Give reasons why it is required, and give a case where it is an advantage, and a case where it is a disadvantage (Answered)
Describe buffering in the I/O subsystem of an operating system. Give reasons why it is required, and give a case where it is an advantage, and a case where it is a disadvantage .
Posted On:Mon 6, June 2022 06:46:21 am
12.   Name and describe four page replacement algorithms. Critically compare them with each other. (Answered)
Name and describe four page replacement algorithms. Critically compare them with each other. .
Posted On:Mon 6, June 2022 06:45:19 am
13.   Describe two virtual memory page fetch policies. Which is less common in practice? Why? (Answered)
Describe two virtual memory page fetch policies. Which is less common in practice? Why? .
Posted On:Mon 6, June 2022 06:41:51 am
14.   Enumerate some pros and cons for increasing the page size. (Answered)
Enumerate some pros and cons for increasing the page size. .
Posted On:Mon 6, June 2022 06:41:18 am
15.   What is thrashing? How might it be detected? How might one recover from it once detected? (Answered)
What is thrashing? How might it be detected? How might one recover from it once detected? .
Posted On:Mon 6, June 2022 06:40:47 am
16.   How does page size of a particular achitecture affect working set size? (Answered)
How does page size of a particular achitecture affect working set size? .
Posted On:Mon 6, June 2022 06:40:00 am
17.   What is the working set of a process? (Answered)
What is the working set of a process? .
Posted On:Mon 6, June 2022 06:39:20 am
18.   What are temporal locality and spatial locality? (Answered)
What are temporal locality and spatial locality? .
Posted On:Mon 6, June 2022 06:38:24 am
19.   What is an inverted page table? How does it compare to a two-level page table? (Answered)
What is an inverted page table? How does it compare to a two-level page table? .
Posted On:Mon 6, June 2022 06:37:41 am
20.   Describe a two-level page table? How does it compare to a simple page table array? (Answered)
Describe a two-level page table? How does it compare to a simple page table array? .
Posted On:Mon 6, June 2022 06:36:55 am
21.   Some TLBs support address space identifiers (ASIDS), why? (Answered)
Some TLBs support address space identifiers (ASIDS), why? .
Posted On:Mon 6, June 2022 06:36:15 am
22.   What is a translation look-aside buffer? What is contained in each entry it contains? (Answered)
What is a translation look-aside buffer? What is contained in each entry it contains? .
Posted On:Mon 6, June 2022 06:35:23 am
23.   Describe segmentation-based virtual memory. You should consider the components of a memory address, the segment table and its contents, and how the final physical address is formed in your answer (Answered)
Describe segmentation-based virtual memory. You should consider the components of a memory address, the segment table and its contents, and how the final physical address is formed in your answer .
Posted On:Mon 6, June 2022 06:34:35 am
24.   Give some advantages of a system with page-based virtual memory compared to a simply system with base-limit registers that implements swapping. (Answered)
Give some advantages of a system with page-based virtual memory compared to a simply system with base-limit registers that implements swapping. .
Posted On:Mon 6, June 2022 06:33:51 am
25.   Describe page-based virtual memory. You should consider pages, frames, page tables, and Memory Management Units in your answer. (Answered)
Describe page-based virtual memory. You should consider pages, frames, page tables, and Memory Management Units in your answer. .
Posted On:Mon 6, June 2022 06:32:52 am
26.   Base-limit MMUs can support swapping. What is swapping? Can swapping permit an application requiring 16M memory to run on a machine with 8M of RAM? (Answered)
Base-limit MMUs can support swapping. What is swapping? Can swapping permit an application requiring 16M memory to run on a machine with 8M of RAM? .
Posted On:Mon 6, June 2022 06:32:11 am
27.   List and describe the four memory allocation algorithms covered in lectures. Which two of the four are more commonly used in practice? (Answered)
List and describe the four memory allocation algorithms covered in lectures. Which two of the four are more commonly used in practice? .
Posted On:Mon 6, June 2022 06:31:06 am
28.   Describe the difference between external and internal fragmentation. Indicate which of the two are most likely to be an issues on a) a simple memory memory mangement machine using base limit registers and static partitioning, and b) a similar machine using dynamic partitioning (Answered)
Describe the difference between external and internal fragmentation. Indicate which of the two are most likely to be an issues on a) a simple memory memory mangement machine using base limit registers and static partitioning, and b) a similar machine using dynamic partitioning .
Posted On:Mon 6, June 2022 06:30:06 am
29.   Why might filesystems managing external storage devices do write-through caching (avoid buffering writes) even though there is a detrimental affect on performance (Answered)
Why might filesystems managing external storage devices do write-through caching (avoid buffering writes) even though there is a detrimental affect on performance .
Posted On:Mon 6, June 2022 06:29:30 am
30.   What does flushd do on a UNIX system? (Answered)
What does flushd do on a UNIX system? .
Posted On:Mon 6, June 2022 06:28:49 am
31.   The filesystem buffer cache does both buffering and caching. Describe why buffering is needed. Describe how buffering can improve performance (potentially to the detriment of file system robustness). Describe how the caching component of the buffer cache improves performance (Answered)
The filesystem buffer cache does both buffering and caching. Describe why buffering is needed. Describe how buffering can improve performance (potentially to the detriment of file system robustness). Describe how the caching component of the buffer cache improves performance .
Posted On:Mon 6, June 2022 06:27:48 am
32.   What is the reference count field in the inode? You should consider its relationship to directory entries in your answer. (Answered)
What is the reference count field in the inode? You should consider its relationship to directory entries in your answer. .
Posted On:Mon 6, June 2022 06:27:01 am
33.   The Berkeley Fast Filesystem (and Linux Ext2fs) use the idea of block groups. Describe what this idea is and what improvements block groups have over the simple filesystem layout of the System V file system (s5fs). (Answered)
The Berkeley Fast Filesystem (and Linux Ext2fs) use the idea of block groups. Describe what this idea is and what improvements block groups have over the simple filesystem layout of the System V file system (s5fs). .
Posted On:Mon 6, June 2022 04:35:01 am
34.   What is the maximum file size supported by a file system with 16 direct blocks, single, double, and triple indirection? The block size is 512 bytes. Disk block numbers can be stored in 4 bytes. (Answered)
What is the maximum file size supported by a file system with 16 direct blocks, single, double, and triple indirection? The block size is 512 bytes. Disk block numbers can be stored in 4 bytes. .
Posted On:Mon 6, June 2022 04:33:34 am
35.   Given that the maximum file size of combination of direct, single indirection, double indirection, and triple indirection in an inode-based filesystem is approximately the same as a filesystem solely using triple indirection, why not simply use only triple indirection to locate all file blocks? (Answered)
Given that the maximum file size of combination of direct, single indirection, double indirection, and triple indirection in an inode-based filesystem is approximately the same as a filesystem solely using triple indirection, why not simply use only triple indirection to locate all file blocks? .
Posted On:Mon 6, June 2022 04:32:46 am
36.   Why might the direct blocks be stored in the inode itself? (Answered)
Why might the direct blocks be stored in the inode itself? .
Posted On:Mon 6, June 2022 04:31:36 am
37.   How can the block count in an inode differ from the (file size / block size) rounded up to the nearest integer. Can the block count be greater, smaller, or both (Answered)
How can the block count in an inode differ from the (file size / block size) rounded up to the nearest integer. Can the block count be greater, smaller, or both .
Posted On:Mon 6, June 2022 04:30:48 am
38.   Compare bitmap-based allocation of blocks on disk with a free block list (Answered)
Compare bitmap-based allocation of blocks on disk with a free block list .
Posted On:Mon 6, June 2022 04:29:35 am
39.   What file allocation strategy is most appropriate for random access files? (Answered)
What file allocation strategy is most appropriate for random access files? .
Posted On:Mon 6, June 2022 04:28:46 am
40.   What file access pattern is particularly suited to chained file allocation on disk? (Answered)
What file access pattern is particularly suited to chained file allocation on disk? .
Posted On:Mon 6, June 2022 04:28:00 am
41.   Give an example where contiguous allocation of file blocks on disks can be used in practice. (Answered)
Give an example where contiguous allocation of file blocks on disks can be used in practice. .
Posted On:Mon 6, June 2022 04:26:15 am
42.   Give a scenario where choosing a large filesystem block size might be a benefit; give an example where it might be a hinderance (Answered)
Give a scenario where choosing a large filesystem block size might be a benefit; give an example where it might be a hinderance .
Posted On:Mon 6, June 2022 04:25:26 am
43.   Give an example of a scenario that might benefit from a file system supporting an append-only access write (Answered)
Give an example of a scenario that might benefit from a file system supporting an append-only access write .
Posted On:Mon 6, June 2022 04:23:18 am
44.   Filesystems can support sparse files, what does this mean? Give an example of an application's file organisation that might benefit from a file system's sparse file support (Answered)
Filesystems can support sparse files, what does this mean? Give an example of an application's file organisation that might benefit from a file system's sparse file support .
Posted On:Mon 6, June 2022 04:22:26 am
45.   Describe the general strategy behind deadlock prevention, and give an example of a practical deadlock prevention method (Answered)
Describe the general strategy behind deadlock prevention, and give an example of a practical deadlock prevention method .
Posted On:Mon 6, June 2022 04:21:24 am
46.   What must the banker's algorithm know a priori in order to prevent deadlock? (Answered)
What must the banker's algorithm know a priori in order to prevent deadlock? .
Posted On:Mon 6, June 2022 04:20:17 am
47.   Assuming the operating system detects the system is deadlocked, what can the operating system do to recover from deadlock? (Answered)
Assuming the operating system detects the system is deadlocked, what can the operating system do to recover from deadlock? .
Posted On:Mon 6, June 2022 04:19:21 am
48.   For single unit resources, we can model resource allocation and requests as a directed graph connecting processes and resources. Given such a graph, what is involved in deadlock detection (Answered)
For single unit resources, we can model resource allocation and requests as a directed graph connecting processes and resources. Given such a graph, what is involved in deadlock detection .
Posted On:Mon 6, June 2022 04:17:40 am
49.   Describe four general strategies for dealing with deadlocks (Answered)
Describe four general strategies for dealing with deadlocks .
Posted On:Mon 6, June 2022 04:09:51 am
50.   What are the four conditions required for the deadlock to occur? (Answered)
What are the four conditions required for the deadlock to occur? .
Posted On:Mon 6, June 2022 04:00:05 am
Page 2 of 14



About Us

Contact us

Terms of use | Privacy policy

Follow Us:               

All Rights Reserved © 2024; pscustudies.com