Questions only no answers
1. Discuss the managers that make up an operating system. Discuss the five types of operating
systems mentioned in your text.
2. How does internal fragmentation occur? How does external fragmentation occur? Contrast
Written assignment 4, chapter 10 page 341 - 342, exercises 1,4,5,7,9,10,12.
NOS big advantage is security and its goal to keep the integrity of the network uncompromisable. DOS
allows use for resources from all devices on a network. I would choose DOS i
Written assignment 3, chapter 8 page 280-281, exercises 1,2,3,7,9.
Deallocation is important because it frees up resources for other jobs, processes, files, etc. If
deallocation did not occur on a regular basis then there would be limited services a com
Chapter 1 questions 1-9 page 29
1. Name five current operating systems and the computers or configurations each operates.
1. Windows 7 they operate on Intel or amd computes
2. Mac OS X they operate on Macintosh computers
3. OpenSolaris an open source U
Written assignment 4, chapter 9 page 314-315, exercises 5,6,7,11,12,19
Star topology has the advantage of a central hub controlling communications with other devices. The
disadvantage is the central hub has to be sophisticated enough to meet the demands
Questions only no answers
1. Describe a token ring network. What is the purpose of the OSI model?
2. What are the advantages and disadvantages of making the computer network transparent?
3. Define and discuss the use of telnet and ftp in a NOS.
Page 56 -58
1 - The differences between internal and external fragmentation is that internal fragmentation waste
resources when a space is allocated to a task and the task does not use all of it and the remaining space
cant be used by any other task. Exte
3 - One way to detect thrashing is by checking the cpu for unusual amount of resources being used
compared to normal use. The best way to prevent it is to use page replacement policy.
5 - FIFO
Page 1 a
Written assignment 3, chapter 6, page 199-200, exercises 3,4,7,14
The programmer has more control and responsibility in explicit parallelism is he must explicitly state
which instructions can be executed in parallel.
In implicit parallelism the progra
written assignment 5, chapter 11 page 370 - 371, exercises 1, 2, 3, 5.
31pi41PI51pi26PI this password is a combination of the first 6 digits of pi with pi every two number
and capitalized every other times pi is typed. Its easy to remember and has 16 di
Written assignment 2, chapter 4, page 134-136, exercises 1, 3, 4, 7, 9, 12.
1 - b From sleeping I can go straight to eating then walking to hygiene to working then tired back to
sleep. I can Also want to eat af
Written assignment 5, chapter 12 page 394 - 395, exercises 1, 3, 9, 11.
A bank manager can use visual ques to monitor the current situation between waiting customers and
available loan officers. If he sees loan officers are getting through their custome
Written assignment 2, chapter 5, page 165-168, exercises 2, 6, 10.
Deadlock One example of deadlock can be if I called my mother and I stay on hold until she finished
her call, and she is calling my sister but she is on hold with my sister.
Written Assignment 6
Within the semester, many different aspects of operating systems have been learned. One of
the major aspects to understand, is that not all operating systems function the same way as the next.
Within this paper,