Question
Describe why authentication is important for file protection.
Consider the following jobs:
Job # | Arrival time | Run time |
A | 0 | 2 |
B | 2 | 4 |
C | 3 | 5 |
D | 5 | 6 |
E | 6 | 4 |
a) Using the SJF method, compute the completion times of the above jobs, average turnaround time and average waiting time.
b) Using the SRTF (Shortest Remaining Time first) method, compute the completion times of the above jobs, the average turnaround time and the average waiting time. Note that SRTF is SJF with preemption.
Completion time - arrival time = turnaround time
c) Using the Round Robin method (with Quantum = 3), compute the completion times of the above jobs and the average waiting time.
Write a monitor solution to the dining philosopher’s problem.
List the security attacks that cannot be prevented by encryption.
Describe why authentication is important for file protection.
What will be the number of page faults for the algorithms (FIFO, LRU and Optimal) for the following page reference string:
1,2,6,7,2,4,1,7,5,5,3,5,1,2,1,5,7,6,3
for a memory with 4 frames?
Explain the difference between scheduling and allocation of processor resources in a multiprocessor operating system. Identify the counterpart of each, if any, in a uniprocessor operating system. (1
Discuss in detail the Process management, Memory management, I/O & File management and Security and Protection in Windows-11 Operating System.
IGNOU Doubts & Queries
Click to Contact Us
Call - 9199852182 Call - 9852900088 myabhasolutions@gmail.com WhatsApp - 9852900088