Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.
Login to our social questions & Answers Engine to ask questions answer people’s questions & connect with other people.
Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
Questions | Answers | Discussions | Knowledge sharing | Communities & more.
Part of a program where the shared memory is accessed and which should be executed invisibly, is called
critical section. Part of a program where the shared memory is accessed and which should be executed invisibly, is called critical section.
critical section. Part of a program where the shared memory is accessed and which should be executed invisibly, is called critical section.
See lessVirtual Memory
Virtual memory is a memory management technique where secondary memory can be used as if it were a part of the main memory. Virtual memory is a common technique used in a computer's operating system (OS).
Virtual memory is a memory management technique where secondary memory can be used as if it were a part of the main memory. Virtual memory is a common technique used in a computer’s operating system (OS).
See lessIn a magnetic disk, data is recorded in a set of concentric tracks which are subdivided into
Magnetic disks are structured into concentric circles known as tracks. The tracks are the fundamental unit in which the data is organized and written to or read from the magnetic disk. Each track can further be divided into sectors, which are the smallest unit that can be accessed on a disk.
Magnetic disks are structured into concentric circles known as tracks. The tracks are the fundamental unit in which the data is organized and written to or read from the magnetic disk. Each track can further be divided into sectors, which are the smallest unit that can be accessed on a disk.
See lessWhich of the following is not an advantage of multiprogramming?
If it has a large number of jobs, then long-term jobs will have to require a long wait. Memory management is needed in the operating system because all types of tasks are stored in the main memory. Using multiprogramming up to a larger extent can cause a heat-up issue.
If it has a large number of jobs, then long-term jobs will have to require a long wait. Memory management is needed in the operating system because all types of tasks are stored in the main memory. Using multiprogramming up to a larger extent can cause a heat-up issue.
See lessCan you name of the major Operating System used in computers?
The three most common operating systems for personal computers are Microsoft Windows, macOS, and Linux. Modern operating systems use a graphical user interface, or GUI (pronounced gooey).
The three most common operating systems for personal computers are Microsoft Windows, macOS, and Linux. Modern operating systems use a graphical user interface, or GUI (pronounced gooey).
See lessAll the time a computer is switched on, its operating system software has to stay in
primary storage. Operating software is a set of programs, active all the time in the memory of the computer, to manage the resources of the computer for their better and effective use.
primary storage. Operating software is a set of programs, active all the time in the memory of the computer, to manage the resources of the computer for their better and effective use.
See lessSpecial software to create a job queue is called a
Spooler: The spooler is a piece of software that creates a standard request queue in which data, instructions, and processes from many sources are pooled for eventual execution.
Spooler: The spooler is a piece of software that creates a standard request queue in which data, instructions, and processes from many sources are pooled for eventual execution.
See lessThe most common security failure is
1 The Human Factor: A Fragile Gatekeeper At the core of most cyber breaches lies not a zero-day exploit or sophisticated malware, but human error. The “insider threat,” whether deliberate or unwitting, remains a formidable foe.
1 The Human Factor: A Fragile Gatekeeper
At the core of most cyber breaches lies not a zero-day exploit or sophisticated malware, but human error. The “insider threat,” whether deliberate or unwitting, remains a formidable foe.
See lessBlock or buffer caches are used
Block caches or buffer caches are used to improve disk performance to handle interrupts to increase the capacity of the main memory to speed up the main memory. Reading from a disk is very slow compared to accessing (real) memory.
Block caches or buffer caches are used to improve disk performance to handle interrupts to increase the capacity of the main memory to speed up the main memory. Reading from a disk is very slow compared to accessing (real) memory.
See lessThe practice of "bundling" refers to
Bundling refers to a common marketing strategy, in which firms sell multiple goods and services in a single package or "bundle." The price for a bundle is then offered at a discount.
Bundling refers to a common marketing strategy, in which firms sell multiple goods and services in a single package or “bundle.” The price for a bundle is then offered at a discount.
See less