I would expect the disk queue would have a faster response time than the
printer queue. When the job scheduler accepts a job a PCB (process control block) is
created and when the job is executed, the PCB is updated on the process state.
Describe the three specific deallocation scenarios that must be taken into
consideration. What would happen if these scenarios werent taken into
consideration in the operating systems memory deallocation algorithm?
The three deallocation scen
3. Name five current operating systems (other than those mentioned in Table 1.1) and
identify the devices that each is designed to run on.
OS X Yosemite servers and desktop Macs
Google chrome OS- Google Remote Desktop and Chr
Desktop virtualization allows separate partitions on a single server to run different
operating systems, so it is particularly useful for software developers. When
developing software to work across multiple platforms it can be very labor int
Research a DoS attack in a current online media source. Provide a link to the source
article(s). Describe the attack and its impact on the victim and/or its customers.
What changes could the victim of the attack make to prevent similar issue
CMU God Lesson analytic -15619 Cloud Computing
Computer science. Entrepreneur. Life. (/)
CMU God Lesson analytic -15619 Cloud
N O V E M B E R 2 1 S T, 2 0 1 4
Morning, the rst
Greetings class, my name is James McCullough. I live in a small, quiet, town north of Colombia Missouri. I
have been happily married to an amazing woman for over twenty-seven years now. I have one surviving
daughter, and an eight-year-old grand-daughter.
Describe an occupation that could benefit from desktop virtualization. Explain how persons in this field
IT development, like the types of work performed at the place I am employed, require various types of
desktop virtualizations. For inst
Read about processor scheduling on pages 116-128. Select two scheduling algorithms and compare them
to real world scheduling tasks not involving computers. Why do you think these algorithms were selected
for these scheduling tasks?
First come first serve
Review the OSI and TCP/IP Models described on pages 312-319. Discuss the differences between the two
models. Use outside sources to support your response (cite your sources where appropriate).
Although there is some commonality between the OSI and TCP/IP
Describe three types of physical storage currently used.
feature one or more read/write heads that float over each surface of each disk (McHoes 216). They can
use as a single disk, also known as a platter, or can be stacked to
Describe the three specific deallocation scenarios that must be taken into consideration. What would
happen if these scenarios werent taken into consideration in the operating systems memory deallocation
Deallocation of memory using a fixed par
Describe at least one real world example showing benefit from lossy compression. How does lossy
compression help in this example? What would be the impact if lossy compression were not used?
Several years ago, I was co-owner of a website nam
Research a DoS attack in a current online media source. Provide a link to the source article(s).
Describe the attack and its impact on the victim and/or its customers.
On October 21, 2016, a large Denial of service (DoS) attack was conducted against Dyn a
Midterm Exam Study Guide
The midterm exam focuses on material covered through week four. the midterm,
including chapters assigned and discussion group prompts. The following are some of
the topics that may be covered on the final e
Windows vs. Linux:
The Easiest Operating System to Use on a Home Computer.
CISS 301: Operating Systems for Business Computing
Instructor: Jason Oesterly
In most homes within the United
Review the section on Password Alternatives on pages 370-372. What issues might
arise from the use of graphical passwords?
When using graphical inputs, a few potential disadvantages are present.
Leading them is that graphical passwords are v
Research Topic A:
1) Ubuntu 9.10
Vendor: Canonial Ltd. Open Source
Platform: X86 machines
Network: Supports LAN
2) Microsoft Windows XP
Vendor: Microsoft Corporation
Platform: X86 machines
Network: Supports LAN
3) Solaris 5.10
Vendor: SUN Mic
Assignment 2: Respond to Research Topic B (p. 52) and Exercises/Advanced
Exercises 2 (p. 53) and 5 (p. 96).
The first computers that can be considered portable where created in 1970s. The
IBM 5100 contained a screen, keyboard, and built-in nu
Is there a perfect memory page size? If so, what would it be and why? If not,
discuss why, including examples.
Page-file sizes are often based on a systems amount of physical RAM. It is a
common recommendation to set a page-file size at 1 the
The first-come, first-served (FCFS) algorithm scheduling is just like it sounds.
It handles incoming objects based on when they arrive. Thus, the objects that arrive
sooner are served sooner. FCFS downside, however, is that it doesnt provide
When do preemptive scheduling policies excel? When do non-preemptive
scheduling policies excel? Provide an example of each not noted in the text.
A preemptive scheduling policy is a scheduling strategy in which there are
interrupt in the proc
Ex 1) A bank that offers loans would be a good example. In this situation there are
peoples who want to withdraw their money from their accounts and people who
want to borrow money from the bank. If the bank has lent more money t
A deadlock occurs in a database if two processes access and lock records of a
database. Database queries and transactions are often brief processes that search
or modify parts of a database. To guarantee integrity of data a technique called
What are the four conditions necessary for deadlock? Which one would be easiest
for the operating system for foresee? Would it be sufficient for the operating system
to focus on only one of the conditions to avoid deadlock?
The four condition
1. Seek time and search time are both related to magnetic disk drive access times.
Seek time is the slower of the two and is the time it takes to position the read/write
head on the proper track. Search time, or rotational delay, is the time
On my home computer I would either user RAID level 0 or 3. Depending on whether
or not my data would be considered critical. Assuming the data is critical, I would
use level 3 because is effective in data critical systems that dont need to b
Describe three types of physical storage currently used. What usage scenarios
would be ideal for each?
The three types of storage typically currently used are Magnetic Disk, Optical Disc,
and Solid State Storage.
Magnetic Disk drives are stor
1. File deallocation is a process that is carried out by the computer that releases the
block of data from memory and allows that data to be used by another program. If
file deallocation does not occur regularly then the system would get a me
Describe at least one real world example showing benefit from lossy compression.
How does lossy compression help in this example? What would be the impact if
lossy compression were not used?
Lossy compression permanently reduces a files size
Donovan E. Waldrop
27 June 2017
3. Name five current operating systems (other than those mentioned in Table 1.1) and identify the
devices that each is designed to run on.
Google chrome OS- Chrome cast, Google remote desktops, and G