
Processor scheduling;refers to allocating each job waiting for execution a processor time at a given interval.
Resource allocation;each available request is given a unique identification number called interrupt request(IRQ),poor resource allocation will result to a deadlock. A deadlock is a situation where a particular job holds a requested resource but fails to release it.
Memory management ;operating systems determines which tasks should remain in the memory waiting for execution and which should be kicked /moved in the secondary memory.
Input/output management;Operating system coordinates between various input,output and peripheral devices.
Communication control and management;operating systems is responsible for managing communication devices and provides an environment within which communication protocol operate.
Error handing;operating systems have ways of alerting user of hardware and software failures and if possible shows the user how to correct.
Softwaretech answered the question on April 27, 2019 at 08:13
-
Explain the following types of schedulers. (a)long term scheduler. (b)short term scheduler. (c)medium term scheduler
(Solved)
Explain the following types of schedulers.
(a)long term scheduler.
(b)short term scheduler.
(c)medium term scheduler
Date posted:
April 27, 2019
.
Answers (1)
-
Describe the guidelines that assist system auditors detect and deter fraud occurrences in an organization
(Solved)
Describe the guidelines that assist system auditors detect and deter fraud occurrences in an organization
Date posted:
March 27, 2019
.
Answers (1)
-
Give the rules used for naming an identifier
(Solved)
Identifier are user defined words used to name entities like variables,arrays,function,structures e.t.c
Date posted:
March 12, 2019
.
Answers (1)
-
Give 2 uses of a comment line as used in c language.
(Solved)
Comment line indicates the purpose of the program and is represented as /*..........*/.
Comment line can be single or multiple line but should not be nested,can be anywhere in a program except inside a string and character constant.
Date posted:
March 12, 2019
.
Answers (1)
-
Explain a two tier client server architecture and a three tier client architecture found in computers
(Solved)
Explain a two tier client server architure and a three tier client architecture found in computers.
Date posted:
March 12, 2019
.
Answers (1)
-
Describe the main Main Characteristics of the Database Approach as used in database models.
(Solved)
Describe the main Main Characteristics of the Database Approach as used in database models.
Date posted:
March 9, 2019
.
Answers (1)
-
Write a java program that allows user to input three numbers and output the largest of the three number after program compilation
(Solved)
Write a java program that allows user to input three numbers and output the largest of the three number after program compilation.
Date posted:
March 5, 2019
.
Answers (2)
-
Compare and contrast Multiprogramming, Multitasking and Multiprocessing
(Solved)
Compare and contrast Multiprogramming, Multitasking and Multiprocessing
Date posted:
March 5, 2019
.
Answers (1)
-
What is the relationship between threads and processes?
(Solved)
What is the relationship between threads and processes in computer operating system?
Date posted:
March 5, 2019
.
Answers (1)
-
What is the function of the ready queue?
(Solved)
Explain the function of ready queue as in operating system
Date posted:
March 5, 2019
.
Answers (1)
-
How do you create a HTML program using notepad?
(Solved)
This question talks about how you can create your own basic HTML program using only the notepad and an internet software like Internet explorer.The answer has it all.
Date posted:
December 24, 2018
.
Answers (1)
-
Outline the five state model of a process in operating systems
(Solved)
Outline the five state model of a process in operating systems.
Date posted:
December 18, 2018
.
Answers (1)
-
Data compression implies sending or storing a smaller number of bits. Although many methods are used for this purpose, in general this methods can be...
(Solved)
Data compression implies sending or storing a smaller number of bits. Although many methods are used for this purpose, in general this methods can be divided into two broad categories : Lossless and Lossy methods. Discuss compression methods under each category.
Date posted:
December 1, 2018
.
Answers (1)
-
Explain reasons for an organization establishing computer network
(Solved)
Explain reasons for an organization establishing computer network.
Date posted:
November 24, 2018
.
Answers (1)
-
What are the importance of system documentation?
(Solved)
What are the importance of system documentation?
Date posted:
October 13, 2018
.
Answers (1)
-
Give the limitations of system design
(Solved)
Give the limitations of system design
Date posted:
October 13, 2018
.
Answers (1)
-
Outline the importance of system analysis
(Solved)
Outline the importance of system analysis
Date posted:
October 13, 2018
.
Answers (1)
-
Explain types of system maintenance
(Solved)
Explain types of system maintenance
Date posted:
October 10, 2018
.
Answers (1)
-
Explain the causes of system maintenance
(Solved)
Explain the causes of system maintenance
Date posted:
October 10, 2018
.
Answers (1)
-
Give the advantages of pilot and phased changeover
(Solved)
Give the advantages of pilot and phased changeover
Date posted:
October 10, 2018
.
Answers (1)