Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

12) An operating system has just loaded five processes, A, B, C, D and E. They have estimated running times of 6, 4, 3,

image text in transcribedimage text in transcribed

12) An operating system has just loaded five processes, A, B, C, D and E. They have estimated running times of 6, 4, 3, 5 and 2 minutes. Their priorities are 3, 5, 2, 1, and 4, respectively, with 5 being the highest process priority. If priorities-scheduling is used, what is the scheduling order of these processes? b) A--> B > C > D --> E E-> CB --> D --> A B --> E --> A --> C --> D D->C --> A --> E --> B 13) 14) An Operating System provides five important functions as depicted in the Operating System pyramid diagram. The part of the operating system that manages the virtual- memory is the a) b) memory management file and storage management software program compilation processes and scheduling management Assume that a system has 4 GB of main memory divided into 1KB pages. How many pages will be required to access all the 4 GB main memory? 15) a) 1 M b) 2M c) 4 M d) 16 M What is the likely access time for a 10000 RPM hard disk drive? 10 second 10 millisecond c) 10 microsecond d) 10 nanosecond 16) What is the efficiency (in %) of a RAID-5 system constructed with four 1- TB hard disk drives? 3608 a) 10 b) 75 c) 50 100 17) The file system technique for keeping track of file integrity during writing of files is journaling 3308 b) indexing c) link-list FAT 18) Which one of the following file permissions would only allow read-write-execute access to the file owner and group members while granting no access to any other users in a Linux file system? 3308 640 600 28 770 777 19) In a Linux Apache server system, the daemon that listens for web service request is syslog vsftpd crond d) httpd 20) The Android, Fedora and Ubuntu OS are considered as Linux distributions because they share a similar c) d) user interface. Linux kernel. built number. vendor.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Computer Networking A Top-Down Approach

Authors: James Kurose, Keith Ross

7th edition

978-0133594140

More Books

Students also viewed these Computer Network questions

Question

48. Verify the formula given for the Pi of the M/M/k.

Answered: 1 week ago

Question

46. In the G/M/1 model if G is exponential with rate show that = /.

Answered: 1 week ago