2.99 See Answer

Question: What operations can be performed on a


What operations can be performed on a semaphore?


> As a result of marital problems, Howard R. Bankerd “left for the west,” and Virginia Bankerd, his wife, continued to reside in their jointly owned home. Before his departure, Howard executed a power of attorney to Arthur V. King, which authorized King to

> Mercedes Connolly and her husband purchased airline tickets and a tour package for a tour to South Africa from Judy Samuelson, a travel agent conducting business as International Tours of Manhattan. Samuelson sold tickets for a variety of airline compani

> Lapp Roofing and Sheet Metal Company, Inc., is an Ohio corporation headquartered in Dayton, Ohio. The company provides construction services in several states. Lapp Roofing sent James Goldick and other Lapp Roofing employees to work on a roofing project

> The Grand Island Production Credit Association (Grand Island) is a federally chartered credit union. Carl M. and Beulah C. Humphrey, husband and wife, entered into a loan arrangement with Grand Island for a $50,000 line of credit. Mr. and Mrs. Humphrey s

> The Record Company, Inc. (The Record Company),entered into a purchase agreement to buy certain retail record stores from Bummbusiness, Inc. (Bummbusiness). All assets and inventory were included in the deal. The Record Company agreed to pay Bummbusiness

> Peter and Geraldine Tabala (Debtors), husband and wife, purchased a house in Clarkstown, New York. They purchased a Carvel ice cream business for $70,000 with a loan obtained from People’s National Bank. In addition, the Carvel Corporation extended trade

> Margaret Kawaauhau sought treatment from Dr. Paul Geiger for a foot injury. Dr. Geiger examined Kawaauhau and admitted her to the hospital to attend to the risks of infection. Although Dr. Geiger knew that intravenous penicillin would have been a more ef

> Donald Wayne Doyle (Debtor) obtained a guaranteed student loan to enroll in a school for training truck drivers. Due to his impending divorce, Debtor never attended the program. The first monthly installment of approximately $50 to pay the student loan b

> James F. Kost filed a voluntary petition for relief under Chapter 11 of the Bankruptcy Code. First Interstate Bank of Greybull (First Interstate) held a first mortgage on the debtor’s residence near Basin, Wyoming. Appraisals and other evidence showed th

> Dr. Morris Lebovitz and Kerrye Hill Lebovitz, husband and wife, were residents of the state of Tennessee. Dr. Lebovitz filed for bankruptcy protection as a result of illness. Mrs. Lebovitz (Debtor) filed for bankruptcy because she had co-signed on a larg

> Harder & Sons, Inc., an International Harvester dealership in Ionia, Michigan, sold a used International Harvester 1066 diesel tractor to Terry Blaser on an installment contract. Although the contract listed Blaser’s address as Ionia County, Blaser infor

> Mike Thurmond operated Top Quality Auto Sales, a used car dealership. Top Quality financed its inventory of vehicles by obtaining credit under a financing arrangement with Indianapolis Car Exchange (ICE). ICE filed a financing statement that listed Top Q

> Heritage Ford Lincoln Mercury, Inc. (Heritage) was in the business of selling new cars. Heritage entered into an agreement with Ford Motor Credit Company (Ford) whereby Ford extended a continuing line of credit to Heritage to purchase vehicles. Heritage

> Prior Brothers, Inc. (PBI), began financing its farming operations through Bank of California, N.A. (Bank). Bank’s loans were secured by PBI’s equipment and after-acquired property. Bank immediately filed a financing statement, perfecting its security in

> John Waddell Construction Company (Waddell) maintained a checking account at the Longview Bank & Trust Company (Longview Bank). Waddell drafted a check from this account made payable to two payees, Engineered Metal Works (Metal Works) and E. G. Smith Con

> Joseph H. Jones and others (debtors) borrowed money from Columbus Junction State Bank (Bank) and executed a security agreement in favor of Bank. Bank perfected its security interest by filing financing statements covering “equipment, farm products, crops

> C&H Trucking, Inc. (C&H), borrowed $19,747.56 from S&D Petroleum Company, Inc. (S&D). S&D hired Clifton M. Tamsett to prepare a security agreement naming C&H as the debtor and giving S&D a security interest in a new Mack truck. The security agreement pre

> PSC Metals, Inc. (PSC), entered into an agreement whereby it extended credit to Keystone Consolidated Industries, Inc., and took back a security interest in personal property owned by Keystone. PSC filed a financing statement with the state, listing the

> Elizabeth Valentine purchased a home in Philadelphia, Pennsylvania. She applied for and received a home loan from Salmon Building and Loan Association (Salmon) for the purpose of paneling the cellar walls and redecorating the house. Salmon took a securit

> Jessie Lynch became seriously ill and needed medical attention. Her sister, Ethel Sales, took her to the Forsyth Memorial Hospital in North Carolina for treatment. Lynch was admitted for hospitalization. Sales signed Lynch’s admission form, which include

> Sally Fitch obtained a loan from Buffalo Federal Savings and Loan Association (Buffalo Federal). She signed a promissory note for $130,000 with interest at 17 percent. The loan was secured with a real estate mortgage on property owned by Fitch located in

> Elmer and Arletta Hans, husband and wife, owned a parcel of real property in Illinois. They borrowed $100,000 from First Illinois National Bank (First Illinois) and executed a note and mortgage to First Illinois, making the real estate security for the l

> Atlantic Ocean Kampgrounds, Inc. (Atlantic) borrowed $60,000 from Camden National Bank (Camden National) and executed a note and mortgage on property located in Camden, Maine, securing that amount. Maine permits strict foreclosure. Atlantic defaulted on

> Ironwood Exploration, Inc. (Ironwood) owned a lease on oil and gas property located in Duchesne County, Utah. Ironwood contracted to have Lantz Drilling and Exploration Company, Inc. (Lantz), drill an oil well on the property. Thereafter, Lantz rented eq

> Mr. Gennone maintained a checking account at Peoples National Bank & Trust Company of Pennsylvania (Bank). Gennone noticed that he was not receiving his bank statements and canceled checks. When Gennone contacted Bank, he was informed that the statements

> David M. Fox was a distributor of tools manufactured and sold by Matco Tools Corporation (Matco). Cox purchased tools from Matco, using a credit line that he repaid as the tools were sold. The credit line was secured by Cox’s Matco tool inventory. In ord

> What is the relationship between FIFO and clock page replacement algorithms?

> What is the difference between resident set management and page replacement policy?

> Briefly define the alternative page fetch policies.

> What is the purpose of a translation lookaside buffer?

> What elements are typically found in a page table entry? Briefly define each element.

> Why is the principle of locality crucial to the use of virtual memory?

> Explain thrashing.

> What is the difference between simple paging and virtual memory paging?

> What is the distinction between blocking and nonblocking with respect to messages?

> What is a monitor?

> Because we have standards such as TCP/IP, why is middleware needed?

> What is the difference between strong and weak semaphores?

> What is the difference between a page and a segment?

> What is the difference between a page and a frame?

> What are the distinctions among logical, relative, and physical addresses?

> What is the difference between internal and external fragmentation?

> In a fixed partitioning scheme, what are the advantages of using unequal-size partitions?

> What are some reasons to allow two or more processes to all have access to a particular region of memory?

> Why is it not possible to enforce memory protection at compile time?

> Why is the capability to relocate processes desirable?

> What requirements is memory management intended to satisfy?

> What is middleware?

> What is the difference between binary and general semaphores?

> What is the difference among deadlock avoidance, detection, and prevention?

> How can the circular wait condition be prevented?

> List two ways in which the no-preemption condition can be prevented.

> How can the hold-and-wait condition be prevented?

> What are the four conditions that create deadlock?

> What are the three conditions that must be present for deadlock to be possible?

> Give examples of reusable and consumable resources.

> List the requirements for mutual exclusion.

> Explain the rationale behind the three-tier client/server architecture.

> List the three control problems associated with competing processes, and briefly define each

> What is the distinction between competing processes and cooperating processes?

> List three degrees of awareness between processes and briefly define each.

> What is the basic requirement for the execution of concurrent processes?

> What are three contexts in which concurrency arises?

> List four design issues for which the concept of concurrency is relevant.

> Give three examples of an interrupt.

> What is the difference between an interrupt and a trap?

> What are the steps performed by an OS to create a new process?

> Why are two modes (user and kernel) needed?

> Define the two types of distributed deadlock.

> List three general categories of information in a process control block.

> Define jacketing.

> List two disadvantages of ULTs compared to KLTs.

> List three advantages of ULTs over KLTs.

> What resources are typically shared by all of the threads of a process?

> Give four general examples of the use of threads in a single user multiprocessing system.

> What are the two separate and potentially independent characteristics embodied in the concept of process?

> List reasons why a mode switch between threads may be cheaper than a mode switch between processes.

> Table 3.5 lists typical elements found in a process control block for an unthreaded OS. Of these, which should belong to a thread control block, and which should belong to a process control block for a multithreaded system? Table 3.5: Process Identi

> For what types of entities does the OS maintain tables of information for management purposes?

> What is the difference between distributed mutual exclusion enforced by a centralized algorithm and enforced by a distributed algorithm?

> List four characteristics of a suspended process.

> Why does Figure 3.9b have two blocked states? Figure 3.9b: New Suspend Activate Dispatch Release Ready/ Suspend Ready Running Exit Suspend Time-out Activate Blocked/ Suspend Blocked Suspend (b) With two Suspend states Event upy occurs Admit Event oc

> What is swapping and what is its purpose?

> What does it mean to preempt a process?

> For the processing model of Figure 3.6, briefly define each state. Figure 3.6: Dispatch Admit Release New Ready Running Exit Time-out Event Event occurs wait Blocked

> What common events lead to the creation of a process?

> Generalize Equations (1.1) and (1.2) in Appendix 1A to n-level memory hierarchies.

> Directories can be implemented either as “special files” that can only be accessed in limited ways or as ordinary data files. What are the advantages and disadvantages of each approach?

> What are the advantages of using directories?

> Ignoring overhead for directories and file descriptors, consider a file system in which files are stored in blocks of 16K bytes. For each of the following file sizes, calculate the percentage of wasted file space due to incomplete filling of the last blo

> Both the search and the insertion time for a B-tree are a function of the height of the tree. We would like to develop a measure of the worst-case search or insertion time. Consider a B-tree of degree d that contains a total of n keys. Develop an inequal

> An alternative algorithm for insertion into a B-tree is the following: As the insertion algorithm travels down the tree, each full node that is encountered is immediately split, even though it may turn out that the split was unnecessary. a. What is the a

> For the B-tree in Figure 12.4c, show the result of inserting the key 97. Figure 12.4: Key, Key, Key- Subtree; Subtree, Subtree Subtree, Subree, Figure 12.4 A B-tree Node with k Children

> What file organization would you choose to maximize efficiency in terms of speed of access, use of storage space, and ease of updating (adding/deleting/modifying) when the data are: a. updated infrequently and accessed frequently in random order? b. upda

> What is an instruction trace?

> One scheme to avoid the problem of preallocation versus waste or lack of contiguity is to allocate portions of increasing size as the file grows. For example, begin with a portion size of one block, and double the portion size for each allocation. Consid

> Some operating systems have a tree–structured file system but limit the depth of the tree to some small number of levels. What effect does this limit have on users? How does this simplify file system design (if it does)?

> Define: B=block size R=record size P=size of block pointer F=blocking factor; expected number of records within a block Give a formula for F for the three blocking methods depicted in Figure 12.8 Figure 12.8: Record I Record 2 Record 3 Record 4 Trac

> Repeat the preceding problem using DMA, and assume one interrupt per sector. Data from problem 11.8: There are 512 bytes/sector. Since each byte generates an interrupt, there are 512 interrupts. Total interrupt processing time = 2.5 × 512 = 1280 µs. The

> Consider the disk system described in Problem 11.7, and assume the disk rotates at 360 rpm. A processor reads one sector from the disk using interrupt-driven I/O, with one interrupt per byte. If it takes to process each interrupt, what percentage of the

2.99

See Answer