|
INTERVIEW QUESTIONS
OPERATING SYSTEMS
DETAILS
Question: What is meant by arm-stickiness?
Answer: If one or a few processes have a high access rate to data on one track of a storage disk, then they may monopolize the device by repeated requests to that track. This generally happens with most common device scheduling algorithms (LIFO, SSTF, C-SCAN, etc). High-density multisurface disks are more likely to be affected by this than low density ones
|
|
|
Category |
Operating Systems Interview Questions & Answers -
Exam Mode /
Learning Mode
|
Rating |
(0.3) By 6982 users |
Added on |
9/9/2014 |
Views |
67158 |
Rate it! |
|
|
Question:
What is meant by arm-stickiness?
Answer:
If one or a few processes have a high access rate to data on one track of a storage disk, then they may monopolize the device by repeated requests to that track. This generally happens with most common device scheduling algorithms (LIFO, SSTF, C-SCAN, etc). High-density multisurface disks are more likely to be affected by this than low density ones Source: CoolInterview.com
If you have the better answer, then send it to us. We will display your answer after the approval.
Rules to Post Answers in CoolInterview.com:-
- There should not be any Spelling Mistakes.
- There should not be any Gramatical Errors.
- Answers must not contain any bad words.
- Answers should not be the repeat of same answer, already approved.
- Answer should be complete in itself.
|
|
Related Questions |
View Answer |
|
What is cycle stealing?
|
View Answer
|
|
When is a system in safe state?
|
View Answer
|
|
What is the resident set and working set of a process?
|
View Answer
|
|
What is the Translation Lookaside Buffer (TLB)?
|
View Answer
|
|
What are the typical elements of a process image?
|
View Answer
|
|
What are turnaround time and response time?
|
View Answer
|
|
What are short-, long- and medium-term scheduling?
|
View Answer
|
|
List the Coffman's conditions that lead to a deadlock.
|
View Answer
|
|
What is thrashing?
|
View Answer
|
|
What is a binary semaphore? What is its use?
|
View Answer
|
|
Explain Belady's Anomaly.
|
View Answer
|
|
Explain the concept of Reentrancy.
|
View Answer
|
|
What are the requirements for virtual memory architecture?
|
View Answer
|
|
What do we do when the operating is crashed?How do we install another operating system?
|
View Answer
|
|
What is the purpose and function of an operating system?
|
View Answer
|
|
Which file system allow as much fragmentation FAT32 or NTFS?
|
View Answer
|
|
How the file system of USB flash drives changes after inserting into different operating system?
|
View Answer
|
|
Various input,output and secondary devices must be linked to a mircocomputer through separate
|
View Answer
|
|
what must be stored in menory before the computer can manipulate data
|
View Answer
|
|
What are system calls give examples also?
|
View Answer
|