Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Assume that at time 5 no system resources are being used except for the processor and memory. Also assume that processes P1-P6 have already been

image text in transcribed
Assume that at time 5 no system resources are being used except for the processor and memory. Also assume that processes P1-P6 have already been created, and are currently ready to run or are running. This is a single CPU system, so only 1 process will be running at any given time. Now consider the following events: At time 05: P3 executes a command to read from disk unit 2. At time 09: PA's time slice expires. At time 12: P2 is swapped out. At time 14: A new process is created At time 16: P5 executes a command to read from disk unit 3. At time 19: Pl executes a command to read from disk unit 2. At time 20: P2 is swapped back in. At time 24: An interrupt occurs from disk unit 2: Pl's read is complete. At time 28: P7 executes a command to read from disk unit 1. At time 30: P6 is swapped out. At time 33: P4 executes a command to write from disk unit 1. At time 361 An interrupt occurs from disk unit 1: P's write is complete. At time 37: P6 is swapped back in. At time 40: P2 executes a command to read from disk unit 1. At time 43: An interrupt occurr from dink unit 2.13 n read in complete. At time 44: P4 executes a command to write from disk unit 1. At time 45: An interrupt occurs from disk unit 11 7's read is complete. At time 48: P6 executes a command to read from disk unit 2. At time 49: P1 is swapped out. At time 50: P3 is swapped out. For each time 18, 26, 38, 51, identify which state each process is in (Ready/Running, Blocked, Suspended). Given this information, you are not always sure which particular process is running at any given time, but you can determine if it is ready/running, or if it is instead blocked or suspended. If a process is blocked, further identify the event on which it is blocked and waiting

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Securing SQL Server Protecting Your Database From Attackers

Authors: Denny Cherry

1st Edition

1597496251, 978-1597496254

More Books

Students also viewed these Databases questions

Question

Find Vo in the network shown using source transformation mA

Answered: 1 week ago

Question

=+C&B (especially taxation) laws, regulations, and practices?

Answered: 1 week ago