|
Related Questions |
View Answer |
|
What is meant by arm-stickiness?
|
View Answer
|
|
What is cycle stealing?
|
View Answer
|
|
When is a system in safe state?
|
View Answer
|
|
What is the resident set and working set of a process?
|
View Answer
|
|
What is the Translation Lookaside Buffer (TLB)?
|
View Answer
|
|
What are the typical elements of a process image?
|
View Answer
|
|
What are turnaround time and response time?
|
View Answer
|
|
What are short-, long- and medium-term scheduling?
|
View Answer
|
|
List the Coffman's conditions that lead to a deadlock.
|
View Answer
|
|
What is thrashing?
|
View Answer
|
|
What is a binary semaphore? What is its use?
|
View Answer
|
|
Explain Belady's Anomaly.
|
View Answer
|
|
Explain the concept of Reentrancy.
|
View Answer
|
|
What are the requirements for virtual memory architecture?
|
View Answer
|
|
What do we do when the operating is crashed?How do we install another operating system?
|
View Answer
|
|
What is the purpose and function of an operating system?
|
View Answer
|
|
Which file system allow as much fragmentation FAT32 or NTFS?
|
View Answer
|
|
How the file system of USB flash drives changes after inserting into different operating system?
|
View Answer
|
|
Various input,output and secondary devices must be linked to a mircocomputer through separate
|
View Answer
|
|
what must be stored in menory before the computer can manipulate data
|
View Answer
|