Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Recent questions tagged tanenbaum
0
votes
1
answer
31
Andrew S. Tanenbaum (OS) Edition 4 Exercise 6 Question 15 (Page No. 467)
Explain how the system can recover from the deadlock in previous problem using recovery through preemption. recovery through rollback. recovery through killing processes.
Explain how the system can recover from the deadlock in previous problem usingrecovery through preemption.recovery through rollback.recovery through killing processes.
admin
662
views
admin
asked
Oct 30, 2019
Operating System
tanenbaum
operating-system
deadlock-prevention-avoidance-detection
descriptive
+
–
0
votes
1
answer
32
Andrew S. Tanenbaum (OS) Edition 4 Exercise 6 Question 14 (Page No. 466)
Consider the following state of a system with four processes$, P1, P2, P3,$ and $P4,$ and five types of resources, $RS1, RS2, RS3, RS4,$ and $RS5:$ Using the deadlock detection algorithm described in Section $6.4.2,$ show that there is a deadlock in the system. Identify the processes that are deadlocked.
Consider the following state of a system with four processes$, P1, P2, P3,$ and $P4,$ and five types of resources, $RS1, RS2, RS3, RS4,$ and $RS5:$Using the deadlock dete...
admin
1.3k
views
admin
asked
Oct 30, 2019
Operating System
tanenbaum
operating-system
deadlock-prevention-avoidance-detection
descriptive
+
–
0
votes
0
answers
33
Andrew S. Tanenbaum (OS) Edition 4 Exercise 6 Question 13 (Page No. 466)
The discussion of the ostrich algorithm mentions the possibility of process-table slots or other system tables filling up. Can you suggest a way to enable a system administrator to recover from such a situation?
The discussion of the ostrich algorithm mentions the possibility of process-table slots or other system tables filling up. Can you suggest a way to enable a system admini...
admin
246
views
admin
asked
Oct 30, 2019
Operating System
tanenbaum
operating-system
deadlock-prevention-avoidance-detection
descriptive
+
–
1
votes
1
answer
34
Andrew S. Tanenbaum (OS) Edition 4 Exercise 6 Question 12 (Page No. 466)
In order to control traffic, a network router, $A$ periodically sends a message to its neighbor, $B,$ telling it to increase or decrease the number of packets that it can handle. At some point in time, Router ... number. That message is lost. As described, neither side will ever transmit. What type of deadlock is this?
In order to control traffic, a network router, $A$ periodically sends a message to its neighbor, $B,$ telling it to increase or decrease the number of packets that it can...
admin
433
views
admin
asked
Oct 30, 2019
Operating System
tanenbaum
operating-system
deadlock-prevention-avoidance-detection
descriptive
+
–
1
votes
1
answer
35
Andrew S. Tanenbaum (OS) Edition 4 Exercise 6 Question 11 (Page No. 466)
Suppose that there is a resource deadlock in a system. Give an example to show that the set of processes deadlocked can include processes that are not in the circular chain in the corresponding resource allocation graph.
Suppose that there is a resource deadlock in a system. Give an example to show that the set of processes deadlocked can include processes that are not in the circular cha...
admin
394
views
admin
asked
Oct 30, 2019
Operating System
tanenbaum
operating-system
deadlock-prevention-avoidance-detection
descriptive
+
–
0
votes
0
answers
36
Andrew S. Tanenbaum (OS) Edition 4 Exercise 6 Question 10 (Page No. 466)
Consider Fig. 6-4. Suppose that in step $(o)\: C$ requested $S$ instead of requesting $R.$ Would this lead to deadlock? Suppose that it requested both $S$ and $R.$
Consider Fig. 6-4. Suppose that in step $(o)\: C$ requested $S$ instead of requesting $R.$ Would this lead to deadlock? Suppose that it requested both $S$ and $R.$
admin
294
views
admin
asked
Oct 30, 2019
Operating System
tanenbaum
operating-system
deadlock-prevention-avoidance-detection
descriptive
+
–
0
votes
1
answer
37
Andrew S. Tanenbaum (OS) Edition 4 Exercise 6 Question 9 (Page No. 466)
Fig. 6-3 shows the concept of a resource graph. Do illegal graphs exist, that is, graphs that structurally violate the model we have used of resource usage? If so, give an example of one.
Fig. 6-3 shows the concept of a resource graph. Do illegal graphs exist, that is, graphs that structurally violate the model we have used of resource usage? If so, give a...
admin
527
views
admin
asked
Oct 30, 2019
Operating System
tanenbaum
operating-system
deadlock-prevention-avoidance-detection
resource-allocation
descriptive
+
–
1
votes
3
answers
38
Andrew S. Tanenbaum (OS) Edition 4 Exercise 6 Question 8 (Page No. 466)
Is it possible that a resource deadlock involves multiple units of one type and a single unit of another? If so, give an example.
Is it possible that a resource deadlock involves multiple units of one type and a single unit of another? If so, give an example.
admin
997
views
admin
asked
Oct 28, 2019
Operating System
tanenbaum
operating-system
deadlock-prevention-avoidance-detection
descriptive
+
–
0
votes
0
answers
39
Andrew S. Tanenbaum (OS) Edition 4 Exercise 6 Question 7 (Page No. 466)
Suppose four cars each approach an intersection from four different directions simultaneously. Each corner of the intersection has a stop sign. Assume that traffic regulations require that when two cars approach adjacent stop signs ... on the left to proceed. Is this anomaly a communication deadlock? Is it a resource deadlock?
Suppose four cars each approach an intersection from four different directions simultaneously. Each corner of the intersection has a stop sign. Assume that traffic regula...
admin
291
views
admin
asked
Oct 28, 2019
Operating System
tanenbaum
operating-system
deadlock-prevention-avoidance-detection
descriptive
+
–
0
votes
0
answers
40
Andrew S. Tanenbaum (OS) Edition 4 Exercise 6 Question 6 (Page No. 465 - 466)
City streets are vulnerable to a circular blocking condition called gridlock, in which intersections are blocked by cars that then block cars behind them that then block the cars that are trying to enter ... also available. Which prevention algorithm is this? Can you provide any other prevention algorithms for gridlock?
City streets are vulnerable to a circular blocking condition called gridlock, in which intersections are blocked by cars that then block cars behind them that then block ...
admin
320
views
admin
asked
Oct 28, 2019
Operating System
tanenbaum
operating-system
deadlock-prevention-avoidance-detection
descriptive
+
–
0
votes
1
answer
41
Andrew S. Tanenbaum (OS) Edition 4 Exercise 6 Question 5 (Page No. 465)
The four conditions (mutual exclusion, hold and wait, no preemption and circular wait) are necessary for a resource deadlock to occur. Give an example to show that these conditions are not sufficient for a resource deadlock to occur. When are these conditions sufficient for a resource deadock to occur?
The four conditions (mutual exclusion, hold and wait, no preemption and circular wait) are necessary for a resource deadlock to occur. Give an example to show that these ...
admin
476
views
admin
asked
Oct 28, 2019
Operating System
tanenbaum
operating-system
deadlock-prevention-avoidance-detection
descriptive
+
–
0
votes
0
answers
42
Andrew S. Tanenbaum (OS) Edition 4 Exercise 6 Question 4 (Page No. 465)
In Fig. 6-1 the resources are returned in the reverse order of their acquisition. Would giving them back in the other order be just as good?
In Fig. 6-1 the resources are returned in the reverse order of their acquisition. Would giving them back in the other order be just as good?
admin
143
views
admin
asked
Oct 28, 2019
Operating System
tanenbaum
operating-system
deadlock-prevention-avoidance-detection
descriptive
+
–
0
votes
0
answers
43
Andrew S. Tanenbaum (OS) Edition 4 Exercise 6 Question 3 (Page No. 465)
In the preceding question, which resources are preemptable and which are nonpreemptable?
In the preceding question, which resources are preemptable and which are nonpreemptable?
admin
154
views
admin
asked
Oct 28, 2019
Operating System
tanenbaum
operating-system
deadlock-prevention-avoidance-detection
preemptable-nonpreemptable
descriptive
+
–
1
votes
0
answers
44
Andrew S. Tanenbaum (OS) Edition 4 Exercise 6 Question 2 (Page No. 465)
Students working at individual PCs in a computer laboratory send their files to be printed by a server that spools the files on its hard disk. Under what conditions may a deadlock occur if the disk space for the print spool is limited? How may the deadlock be avoided?
Students working at individual PCs in a computer laboratory send their files to be printed by a server that spools the files on its hard disk. Under what conditions may a...
admin
301
views
admin
asked
Oct 28, 2019
Operating System
tanenbaum
operating-system
deadlock-prevention-avoidance-detection
descriptive
+
–
0
votes
1
answer
45
Andrew S. Tanenbaum (OS) Edition 4 Exercise 6 Question 1 (Page No. 465)
Give an example of a deadlock taken from politics.
Give an example of a deadlock taken from politics.
admin
206
views
admin
asked
Oct 28, 2019
Operating System
tanenbaum
operating-system
deadlock-prevention-avoidance-detection
descriptive
+
–
0
votes
0
answers
46
Andrew S. Tanenbaum (OS) Edition 4 Exercise 5 Question 57 (Page No. 434)
Write a program to implement multiple timers using a single clock. Input for this program consists of a sequence of four types of commands ... , and Clock header. Your program should also print out a statement whenever it is time to raise a signal.
Write a program to implement multiple timers using a single clock. Input for this program consists of a sequence of four types of commands $(S<int , T<int>, E<int , P<int...
admin
161
views
admin
asked
Oct 28, 2019
Operating System
tanenbaum
operating-system
input-output
descriptive
+
–
0
votes
1
answer
47
Andrew S. Tanenbaum (OS) Edition 4 Exercise 5 Question 56 (Page No. 434)
Write a program to implement the three disk-arm scheduling algorithms. Write a driver program that generates a sequence of cylinder numbers $(0–999)$ at random, runs the three algorithms for this sequence and prints out the total distance (number of cylinders) the arm needs to traverse in the three algorithms.
Write a program to implement the three disk-arm scheduling algorithms. Write a driver program that generates a sequence of cylinder numbers $(0–999)$ at random, runs th...
admin
419
views
admin
asked
Oct 28, 2019
Operating System
tanenbaum
operating-system
input-output
disk-scheduling
descriptive
+
–
0
votes
0
answers
48
Andrew S. Tanenbaum (OS) Edition 4 Exercise 5 Question 55 (Page No. 434)
Write a program that simulates stable storage. Use two large fixed-length files on your disk to simulate the two disks.
Write a program that simulates stable storage. Use two large fixed-length files on your disk to simulate the two disks.
admin
176
views
admin
asked
Oct 28, 2019
Operating System
tanenbaum
operating-system
input-output
descriptive
+
–
0
votes
0
answers
49
Andrew S. Tanenbaum (OS) Edition 4 Exercise 5 Question 54 (Page No. 434)
A notebook computer is set up to take maximum advantage of power saving features including shutting down the display and the hard disk after periods of inactivity. A user sometimes runs UNIX programs in text mode, and ... She is surprised to find that battery life is significantly better when she uses text-only programs. Why?
A notebook computer is set up to take maximum advantage of power saving features including shutting down the display and the hard disk after periods of inactivity. A user...
admin
196
views
admin
asked
Oct 28, 2019
Operating System
tanenbaum
operating-system
input-output
unix
descriptive
+
–
0
votes
1
answer
50
Andrew S. Tanenbaum (OS) Edition 4 Exercise 5 Question 53 (Page No. 434)
If a CPU's maximum voltage, $V,$ is cut to $V/n,$ its power consumption drops to $1/n^{2}$ of its original value and its clock speed drops to $1/n$ of its original value. Suppose that a user ... is the corresponding energy saving in percent compared to not cutting the voltage? Assume that an idle CPU consumes no energy at all.
If a CPU’s maximum voltage, $V,$ is cut to $V/n,$ its power consumption drops to $1/n^{2}$ of its original value and its clock speed drops to $1/n$ of its original valu...
admin
356
views
admin
asked
Oct 28, 2019
Operating System
tanenbaum
operating-system
input-output
descriptive
+
–
0
votes
1
answer
51
Andrew S. Tanenbaum (OS) Edition 4 Exercise 5 Question 52 (Page No. 434)
Describe two advantages and two disadvantages of thin client computing?
Describe two advantages and two disadvantages of thin client computing?
admin
239
views
admin
asked
Oct 28, 2019
Operating System
tanenbaum
operating-system
input-output
descriptive
+
–
0
votes
1
answer
52
Andrew S. Tanenbaum (OS) Edition 4 Exercise 5 Question 51 (Page No. 434)
It has been observed that a thin-client system works well with a $1$-Mbps network in a test. Are any problems likely in a multiuser situation? (Hint: Consider a large number of users watching a scheduled TV show and the same number of users browsing the World Wide Web.)
It has been observed that a thin-client system works well with a $1$-Mbps network in a test. Are any problems likely in a multiuser situation? (Hint: Consider a large num...
admin
210
views
admin
asked
Oct 28, 2019
Operating System
tanenbaum
operating-system
input-output
descriptive
+
–
0
votes
1
answer
53
Andrew S. Tanenbaum (OS) Edition 4 Exercise 5 Question 50 (Page No. 434)
A thin-client terminal is used to display a Web page containing an animated cartoon of size $400\: \text{pixels} \times 160\: \text{pixels}$ running at $10\: \text{frames/sec.}$ What fraction of a $100$-Mbps Fast Ethernet is consumed by displaying the cartoon?
A thin-client terminal is used to display a Web page containing an animated cartoon of size $400\: \text{pixels} \times 160\: \text{pixels}$ running at $10\: \text{frames...
admin
273
views
admin
asked
Oct 28, 2019
Operating System
tanenbaum
operating-system
input-output
descriptive
+
–
0
votes
0
answers
54
Andrew S. Tanenbaum (OS) Edition 4 Exercise 5 Question 49 (Page No. 433 - 434)
In the text we gave an example of how to draw a rectangle on the screen using the Windows GDI: Rectangle(hdc, xleft, ytop, xright, ybottom); Is there any real need for the first parameter (hdc), and if so, what? After all, the coordinates of the rectangle are explicitly specified as parameters.
In the text we gave an example of how to draw a rectangle on the screen using the Windows GDI:Rectangle(hdc, xleft, ytop, xright, ybottom);Is there any real need for the ...
admin
147
views
admin
asked
Oct 28, 2019
Operating System
tanenbaum
operating-system
input-output
descriptive
+
–
0
votes
0
answers
55
Andrew S. Tanenbaum (OS) Edition 4 Exercise 5 Question 48 (Page No. 433)
In Fig. 5-36 there is a class to RegisterClass. In the corresponding $X$ Window code, in Fig. 5-34, there is no such call or anything like it. Why not?
In Fig. 5-36 there is a class to RegisterClass. In the corresponding $X$ Window code, in Fig. 5-34, there is no such call or anything like it. Why not?
admin
294
views
admin
asked
Oct 28, 2019
Operating System
tanenbaum
operating-system
input-output
descriptive
+
–
0
votes
1
answer
56
Andrew S. Tanenbaum (OS) Edition 4 Exercise 5 Question 47 (Page No. 433)
Assuming that it takes $2\: nsec$ to copy a byte, how much time does it take to completely rewrite the screen of an $80\: \text{character} \times \text{25}$ line text mode memory-mapped screen? What about a $1024 \times 768$ pixel graphics screen with $24$-bit color?
Assuming that it takes $2\: nsec$ to copy a byte, how much time does it take to completely rewrite the screen of an $80\: \text{character} \times \text{25}$ line text mod...
admin
452
views
admin
asked
Oct 28, 2019
Operating System
tanenbaum
operating-system
input-output
memory-mapped
descriptive
+
–
0
votes
1
answer
57
Andrew S. Tanenbaum (OS) Edition 4 Exercise 5 Question 46 (Page No. 433)
One way to place a character on a bitmapped screen is to use BitBlt from a font table. Assume that a particular font uses characters that are $16 24$ pixels in true RGB color. How much font table space does each ... a byte takes $100\: nsec,$ including overhead, what is the output rate to the screen in characters/sec?
One way to place a character on a bitmapped screen is to use BitBlt from a font table. Assume that a particular font uses characters that are $16 × 24$ pixels in true RG...
admin
378
views
admin
asked
Oct 28, 2019
Operating System
tanenbaum
operating-system
input-output
descriptive
+
–
0
votes
0
answers
58
Andrew S. Tanenbaum (OS) Edition 4 Exercise 5 Question 45 (Page No. 433)
The primary additive colors are red, green, and blue, which means that any color can be constructed from a linear superposition of these colors. Is it possible that someone could have a color photograph that cannot be represented using full $24$-bit color?
The primary additive colors are red, green, and blue, which means that any color can be constructed from a linear superposition of these colors. Is it possible that someo...
admin
145
views
admin
asked
Oct 28, 2019
Operating System
tanenbaum
operating-system
input-output
descriptive
+
–
0
votes
1
answer
59
Andrew S. Tanenbaum (OS) Edition 4 Exercise 5 Question 44 (Page No. 433)
The designers of a computer system expected that the mouse could be moved at a maximum rate of $20\: cm/sec.$ If a mickey is $0.1 \:mm$ and each mouse message is $3$ bytes, what is the maximum data rate of the mouse assuming that each mickey is reported separately?
The designers of a computer system expected that the mouse could be moved at a maximum rate of $20\: cm/sec.$ If a mickey is $0.1 \:mm$ and each mouse message is $3$ byte...
admin
206
views
admin
asked
Oct 28, 2019
Operating System
tanenbaum
operating-system
input-output
descriptive
+
–
0
votes
1
answer
60
Andrew S. Tanenbaum (OS) Edition 4 Exercise 5 Question 43 (Page No. 433)
A user at a terminal issues a command to an editor to delete the word on line $5$ occupying character positions $7$ through and including $12.$ Assuming the cursor is not on line $5$ when the command is given, what ANSI escape sequence should the editor emit to delete the word?
A user at a terminal issues a command to an editor to delete the word on line $5$ occupying character positions $7$ through and including $12.$ Assuming the cursor is not...
admin
221
views
admin
asked
Oct 28, 2019
Operating System
tanenbaum
operating-system
input-output
descriptive
+
–
Page:
« prev
1
2
3
4
5
6
7
...
16
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register