This document covers various topics related to Operating System including scheduling algorithms, deadlock, file naming conventions, and commands like chmod, cd, ls, and mkdir. It also includes a bibliography of relevant sources.
Contribute Materials
Your contribution can guide someoneโs learning journey. Share your
documents today.
Running head: OPERATING SYSTEM Operating System Name of the Student: Name of the University: Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4 OPERATING SYSTEM b) i) FCFS The number of total tracks are: (17 + 34 + 25 + 27 + 21 + 3 + 37 + 33) = 197 tracks Number of average tracks: (1947/8) = 24.625 ii) SSTF The number of total tracks are: (2 + 1 + 3 + 9 + 19 + 37 + 16 + 2) = 89 tracks Number of average tracks: (89/ 8) = 11.125 iii) LOOK The number of total tracks are: (1 + 16 + 2 + 21 + 1 + 5 + 9 + 19) = 74 tracks Number of average tracks: (74/ 8) = 9.25 Answer to question number B โ Q2 a) Deadlock is a state where any two processes in a system requires a single resource however the resource is already allocated to some other process and hence the process goes to a waiting state and cannot continue much further with the process if they do not get the required resource on time. b)
5 OPERATING SYSTEM The four processes that are considered here for the example are P1, P2, P3 and P4. The resources available to the system are R1, R2 and R3. An instance has been considered here for the deadlock criteria. The processes P1 and P4 currently hold the resource R2. However process P3 cannot proceed further without the obtaining the resource P3. Similarly the processes P2, P3 and P4 also goes into a waiting state. Hence, the system goes to a deadlock state. c) i) Fixed Lengths and Variable Length field: The variable length is used for referral to a record of variable length, whereas a fixed length field is required for the referral to a record having fixed lengths. For example: The data storage for an employee of anorganization has been considered in this instance. For the consideration a fixed length field of 3 has been considered here.
6 OPERATING SYSTEM IDE00 NameDEV ADDRESS1AD The same data stored in variable length would be represented as: IDE001 NameDIVINE ADDRESS1ADENVER ii) Relative and Complete File name: The relative file name provides the name of the directory that would be used a root and the file obtained from the relative file name would be complete file. The position of the file in the physical storage system would be considered as the complete file name and the logical position of the file in the data storage system would be considered as the relative file name. Examples of the complete file: C:\Documents\example.docx http://www.facebook.com/image.png Example of a relative file: Dashboard/ example.docx Student\student1\ image.png Answer to question number B-Q3 chmod Introduction
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7 OPERATING SYSTEM The command helps with the change of permissions for the files and directories of the system. The mode of the file is changed with the help of this command. Syntax chmod [OPTION]... MODE[,MODE]... FILE... chmod [OPTION]... OCTAL-MODE FILE... chmod [OPTION]... --reference=RFILE FILE... Examples chmod 754 chmod 777 chmod 754 cd
8 OPERATING SYSTEM Introduction This command is used to change the present directory the user is in. Syntax cd [option] [directory] Examples cd new ls Introduction This command helps to identify all the sub-directories and the files present inside the directory.
9 OPERATING SYSTEM Syntax ls[option...] [file]... Examples ls โ l ls โ a mkdir Introduction This command helps to create a directory. Syntax mkdir [-m=mode] [-p] [-v] [-Z=context] directory [directory ...]
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10 OPERATING SYSTEM mkdir โversion mkdir --help Examples mkdir sample mkdir new
11 OPERATING SYSTEM
12 OPERATING SYSTEM Bibliography [1] Silberschatz, A., Galvin, P.B. and Gagne, G. Operating system concepts essentials. John Wiley & Sons, Inc., 2014. [2] Peter, S., Li, J., Zhang, I., Ports, D.R., Woos, D., Krishnamurthy, A., Anderson, T. and Roscoe, T. Arrakis: The operating system is the control plane. ACM Transactions on Computer Systems (TOCS), 33(4), p.11., 2016. [3] Belay, A., Prekas, G., Klimovic, A., Grossman, S., Kozyrakis, C. and Bugnion, E.x IX: A protected dataplane operating system for high throughput and low latency. In Proceedings of the 11th USENIX Symposium on Operating System Design and Implementation (OSDI) (No. EPFL-CONF-201671). USENIX., 2015 [4] Dautenhahn, N., Kasampalis, T., Dietz, W., Criswell, J. and Adve, V., March. Nested kernel: An operating system architecture for intra-kernel privilege separation. In ACM SIGPLAN Notices (Vol. 50, No. 4, pp. 191-206). ACM., 2015. [5] Shin, S., Song, Y., Lee, T., Lee, S., Chung, J., Porras, P., Yegneswaran, V., Noh, J. and Kang,B.B.,November.Rosemary:Arobust,secure,andhigh-performancenetwork operating system. In Proceedings of the 2014 ACM SIGSAC conference on computer and communications security (pp. 78-89). ACM., 2014.