Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Describe one static priority and one dynamic priority real-time scheduling algorithm. You can use these data in answering the question . You should discuss the

Describe one static priority and one dynamic priority real-time scheduling algorithm. You can use these data in answering the question . You should discuss the issue of admission control, and comment on the data structures that an implementation would need to maintain and on how these would be used to make scheduling decisions.are a data structure protected by a mutual exclusion lock. (i) What scheduling problem could arise here? [2 marks] (ii) How could this problem be overcome? [2 marks] (d) The designer also wishes the real-time system to use demand paged virtual memory for efficiency. (b) In image compression we utilise three different mechanisms to compress pixel data: (i) mapping the pixel values to some other set of values (ii) quantising those values (iii) symbol encoding the resulting values Explain each mechanism, describe the way in which it helps us to compress the image, and describe in what way it affects the visual quality of the resulting (decompressed) image when compared with the original. [10 marks] SECTION B 5 Comparative Programming Languages (a) Outline the main innovations that are in Simula 67 but were not in Algol 60, paying particular attention to Simula Classes. [6 marks] (b) Illustrate how Simula can be used to simulate a small restaurant with six tables, two waiters and small groups of customers arriving at random intervals. Numerical Analysis I Characterize the outright blunder εx and relative mistake δx in addressing a number x. How are these blunders related? Which sort of blunder is related with the term loss of importance? Characterize machine epsilon. In a Hopfield brain network designed as a cooperative memory, with All its loads prepared and fixed, what three potential ways of behaving may happen over the long haul in setup space as the net keeps on emphasizing in reaction to a given info? () and exit() are triggered when cars enter and leave via the barriers. Give pseudocode for the enter and exit procedures (i) if the module is a monitor [8 marks] (b) Describe one static priority and one dynamic priority real-time scheduling algorithm. You should discuss the issue of admission control, and comment on the data structures that an implementation would need to maintain and on how these would be used to make scheduling decisions.are a data structure protected by a mutual exclusion lock. (i) What scheduling problem could arise here? [2 marks] (ii) How could this problem be overcome? [2 marks] (d) The designer also wishes the real-time system to use demand paged virtual memory for efficiency. Discuss this problem from the viewpoints of both data protection law and ethics. [12 marks] 8 CST.2014.4.9 8 Security I (a) Windows implements static inheritance for the access-control lists of NTFS files and folders. (i) What does static inheritance mean here and how does it differ from dynamic inheritance? [4 marks] (ii) Five flag bits (ci,oi,np,io,i) in each NTFS access-control entry (ACE) manage how it is inherited. Briefly describe the purpose of each bit. [5 marks] (b) Describe the design of a discrete occasion test system. What is the head information structure included? 1[15 marks] (c) A queueing network is described by a bunch of visit counts, Vi, furthermore, per-visit How might you expand the meaning of recursive identification to sets of processable capabilities? A grouping of regular numbers is a complete capability s : 22N → N. The arrangement is recursive if and provided that s is processable. By adding protected void add(Object o) {mArray.add(o);} to the ConstrainedArray class, the mArray field can be made private. Show how this would affect your IntListArray class and discuss the advantages of the change from protected to private. [5 marks] (c) The solutions in parts (a) and (b) both involve a get() method returning an Object reference. (i) Explain why this is bad practice. [1 mark] (ii) Propose an alternative solution for a constrained array of Integer or LinkedList objects (only) that addresses this issue.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

ANSWER lets break down a static priority and a dynamic priority realtime scheduling algorithm along with their related aspects Static Priority RealTime Scheduling Algorithm Description In a static pri... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

An Introduction To Management Science Quantitative Approaches To Decision Making

Authors: David Anderson, Dennis Sweeney, Thomas Williams, Jeffrey Cam

13th Edition

9781111532246, 1111532222, 1111532249, 978-1111532222

More Books

Students also viewed these Business Communication questions