Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
q if each the access rights to an object are deleted the object can no longer be accessed at this stage the object should also be deleted and the
q consider a calculating environment where a process is given the privilege of accessing object only n times suggest a scheme for implementing this
q consider a calculating environment where a unique number is associated with each process and each object in the system suppose that we permit a
q what protection problems may occur if a shared stack is used for parameter passinganswer the contents of the stack could be conciliation by other
q the rc 4000 system as well as other systems have defined a tree of processes called a process tree such that all the descendants of a process are
q in a ring-protection system the level 0 has the greatest access to objects and level n greater than zero has fewer access rights the access rights
q a burroughs b7000b6000 mcp file is able to be tagged as sensitive data when such a file is removed its storage area is overwritten by some random
q what are the major differences between capability lists and access listsanswer an access list is a list for each object consisting of the domains
q distinguish among a streams driver and a streams moduleanswer the streams driver controls the physical device that could be involved in a streams
q why is it important to scale up system bus and device speeds as the cpu speed increasesanswer consider a system which carries out 50 io and 50
q how does dma raise system concurrency how does it make difficult hardware designanswer dma increases system concurrency by allowing the cpu to
q polling for an io completion is able to waste a large number of cpu cycles if the processor iterates a busy-waiting loop several times before the
q why might a system utilize interrupt-driven io to manage a single serial port however polling io to manage a front-end processor such as a terminal
q the instance of handshaking used 2 bits a busy bit as well as a command-ready bit is it probable to implement this handshaking with only 1 bit if
q state three merits of placing functionality in a device controller rather than in the kernel and state three disadvantagesanswer three advantages
q presume that we agree that 1 kilobyte is 1024 bytes 1 megabyte is 10242 bytes and 1 gigabyte is 10243 bytes this progression carries on through
q it is occasionally said that tape is a sequential-access medium whereas magnetic disk is a random-access medium in fact the correctness of a
q if magnetic hard disks eventually have the same cost per gigabyte as do tapes will tapes turn into obsolete or will they still be needed describe
q in a disk jukebox what would be the result of having more open files than the number of drives in the jukeboxanswer two bad results could result
q remapping of bad blocks by sector sparing or else sector slipping could influence performance presume that the drive in subsequent exercise has a
q more than one disk drive is able to be attached to a scsi bus especially a fast wide scsi-ii bus can be connected to at most 15 disk drives
q the term fast wide scsi-ii signifies a scsi bus that operates at a data rate of 20 megabytes per second when it moves a packet of bytes among the
q is there any way to execute truly stable storage describe your answeranswer truly steady storage would never lose data the fundamental technique
q what are the tradeoffs concerned in rereading code pages from the file system versus using swap space to store themanswer if codes pages are
q why is it significant to balance file system io among the disks as well as controllers on a system in a multitasking environment answer a system