Questions from Operating Systems


Q: Show how each of the techniques of prevention, avoidance, and

Show how each of the techniques of prevention, avoidance, and detection can be applied to Figure 6.1. Figure 6.1:

See Answer

Q: For Figure 6.3, provide a narrative description of each

For Figure 6.3, provide a narrative description of each of the six depicted paths, similar to the description of the paths of Figure 6.2 provided in Section 6.1. Figure 6.3: Figure 6.2:

See Answer

Q: It was stated that deadlock cannot occur for the situation reflected in

It was stated that deadlock cannot occur for the situation reflected in Figure 6.3. Justify that statement. Figure 6.3:

See Answer

Q: Given the following state for the Banker’s Algorithm: 6 processes P0

Given the following state for the Banker’s Algorithm: 6 processes P0 through P5 4 resource types: A (15 instances); B (6 instances) C (9 instances); D (10 instances) Snapshot at time...

See Answer

Q: In the code below, three processes are competing for six resources

In the code below, three processes are competing for six resources labeled A to F. a. Using a resource allocation graph (see Figures 6.5 and 6.6), show the possibility of a deadlock in this implementa...

See Answer

Q: A spooling system (see Figure 6.17) consists of

A spooling system (see Figure 6.17) consists of an input process I, a user process P, and an output process O connected by two buffers. The processes exchange data in blocks of equal size. These block...

See Answer

Q: Suggest an additional resource constraint that will prevent the deadlock in Problem

Suggest an additional resource constraint that will prevent the deadlock in Problem 6.7, but still permit the boundary between input and output buffers to vary in accordance with the present needs of...

See Answer

Q: In the THE multiprogramming system [DIJK68], a drum (precursor

In the THE multiprogramming system [DIJK68], a drum (precursor to the disk for secondary storage) is divided into input buffers, processing areas, and output buffers, with floating boundaries, dependi...

See Answer

Q: In Section 2.3, we listed five objectives of memory

In Section 2.3, we listed five objectives of memory management, and in Section 7.1, we listed five requirements. Argue that each list encompasses all of the concerns addressed in the other. Data from...

See Answer

Q: Describe the round-robin scheduling technique.

Describe the round-robin scheduling technique.

See Answer