Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
Explain two advantages of memory overlay. (4 marks)DICT MOD 1 July 2020
Memory overlay is a technique that is used to allow a program to execute in a memory space that is smaller than the size of the program. It works by loading different parts of the program into memory as needed and then unloading them when they are no longer needed. There are several advantages to usRead more
Memory overlay is a technique that is used to allow a program to execute in a memory space that is smaller than the size of the program. It works by loading different parts of the program into memory as needed and then unloading them when they are no longer needed. There are several advantages to using memory overlay:
Outline three components of the process scheduler. (3 marks)DICT MOD 1 July 2020
The process scheduler is a component of the operating system that is responsible for managing the execution of processes on a computer. It determines which processes should be run and allocates the available resources (such as processor time and memory) to those processes. There are several componenRead more
The process scheduler is a component of the operating system that is responsible for managing the execution of processes on a computer. It determines which processes should be run and allocates the available resources (such as processor time and memory) to those processes. There are several components of the process scheduler that are involved in this process. Here are three examples:
A computer technician intends to manage computer files. Explain four file operations he could perform during this process. (8 marks)DICT MOD 1 July 2020
other software. This could include creating documents, spreadsheets, presentations, or other types of files. Copying files: The technician may copy files from one location to another, either within the same storage device or between different storage devices. This could be useful for creating backupRead more
Explain two circumstances that would cause user level threading during process execution. (4 marks)DICT MOD 1 July 2020
User level threading occurs when a program creates and manages its own threads, rather than relying on the operating system to do so. There are several circumstances that may cause a program to use user level threading during process execution: The program requires a high degree of control over theRead more
User level threading occurs when a program creates and manages its own threads, rather than relying on the operating system to do so. There are several circumstances that may cause a program to use user level threading during process execution:
Explain two categories of computer input/output devices in respect to data transfer. (4 marks)DICT MOD 1 July 2020
Computer input/output (I/O) devices are devices that allow a computer to communicate with the outside world by transferring data in and out of the system. There are several categories of I/O devices, and they can be classified according to various criteria, such as the type of data transfer they supRead more
Computer input/output (I/O) devices are devices that allow a computer to communicate with the outside world by transferring data in and out of the system. There are several categories of I/O devices, and they can be classified according to various criteria, such as the type of data transfer they support. Here are two categories of I/O devices in respect to data transfer:
Outline four objectives of computer memory management in regards to relocation. (4 marks)DICT MOD 1 July 2020
Computer memory management is the process of allocating and deallocating memory within a computer system. One important aspect of memory management is relocation, which refers to the ability to move a program or data from one location in memory to another. There are several objectives of computer meRead more
Computer memory management is the process of allocating and deallocating memory within a computer system. One important aspect of memory management is relocation, which refers to the ability to move a program or data from one location in memory to another. There are several objectives of computer memory management in regards to relocation:
The administrator of a computer intends to identify the properties of files in a directory. State eight file properties that he may identify. (4 marks)DICT MOD 1 July 2020
File name: The name of the file, which is typically used to identify the file and distinguish it from other files. File type: The type of file, which is typically determined by the file extension (e.g. .doc, .pdf, .txt). File size: The size of the file in bytes, kilobytes, megabytes, or gigabytes. FRead more
Internal fragmentation occurs during file storage. Explain two disadvantages of this type of fragmentation. (4 marks)DICT MOD 1 July 2020
Internal fragmentation occurs when a file is stored in a way that leaves gaps or unused space within the allocated block or blocks of memory. This can happen when the size of the file is not an exact multiple of the block size, or when the file is deleted and replaced by a smaller file. There are seRead more
Internal fragmentation occurs when a file is stored in a way that leaves gaps or unused space within the allocated block or blocks of memory. This can happen when the size of the file is not an exact multiple of the block size, or when the file is deleted and replaced by a smaller file.
There are several disadvantages to internal fragmentation:
Differentiate between automatic repeat request and forward error correction operating systems. (4 marks)DICT MOD 1 July 2020
Automatic Repeat Request (ARQ) is a method used in digital communications to ensure the reliable transmission of data. It works by sending a message and then waiting for an acknowledgement (ACK) from the receiver. If the ACK is not received within a certain time period, the sender will resend the meRead more
Automatic Repeat Request (ARQ) is a method used in digital communications to ensure the reliable transmission of data. It works by sending a message and then waiting for an acknowledgement (ACK) from the receiver. If the ACK is not received within a certain time period, the sender will resend the message. This process continues until the receiver sends an ACK or the sender gives up and declares the transmission a failure.
Forward Error Correction (FEC) is a method used to improve the reliability of data transmission over noisy communication channels. It works by adding redundant information to the data being transmitted. This redundant information can be used by the receiver to detect and correct errors that may have occurred during transmission.
See lessExplain two types of inter-process communication in operating systems. (4 marks)DICT MOD 1 July 2020
Shared memory: This type of IPC allows multiple processes to access a common area of memory in order to exchange data. This can be an efficient way for processes to communicate, as it avoids the overhead of other IPC mechanisms such as message passing. However, it can also be more difficult to impleRead more