subject

Assume that at time 5 no system resources are being used except for the processor and memory. Now consider the following events: At time 5: Pl executes a command to read from disk unit 3.
At time 15: PS's time slice expires
At time 18: P7 executes a command
At time 20: P3 executes a command to read from disk unit 2 to write to disk unit 3.
At time 24: P5 executes a command to write to disk unit 3.
At time 28: P5 is swapped out.
At time 33: An interrupt occurs from disk unit 2: P3's read is complete.
At time 36. An interrupt occurs from disk unit 3: PI's read is complete.
At time 38: PS terminates
At time 40: An interrupt occurs from
At time 44: P5 is swapped back in. disk unit 3: PS's write is complete.
At time 48: An interrupt occurs from disk unit 3: P7's write is complete.

Required:
For each time 22, 37, and 47, identify which state cach process is in. If a process is blocked, further identify the event on which is it blocked.

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 24.06.2019 04:30
What is the process in which the software development team compiles information to determine the final product
Answers: 1
question
Computers and Technology, 24.06.2019 09:50
Suppose you are an ad-serving company and you maintain a log of cookie data for ads you serve to the web pages for a particular vendor (say amazon). a. how can you use this data to determine which are the best ads? b. how can you use this data to determine which are the best ad formats? c. how could you records of past ads and ad clicks to determine which ads to send to a given ip address? d. how could you use this data to determine how well the technique you used in your answer to part c was working? e. how could you use this data to determine that a given ip address is used by more than one person? f. how does having this data give you a competitive advantage vis-à-vis other ad-serving companies?
Answers: 2
question
Computers and Technology, 24.06.2019 17:30
Match the following. 1. formatting that is applied when cell data meets certain criteria 2. borders with formats not found on the border tool 3. a shortcut bar that contains tools for commonly used formats 4. formats that can be applied to numbers conditional formatting custom borders format bar number formats
Answers: 3
question
Computers and Technology, 24.06.2019 18:30
Jacking is a crime that takes place when a hacker misdirects url to a different site. the link itself looks safe, but the user is directed to an unsafe page
Answers: 1
You know the right answer?
Assume that at time 5 no system resources are being used except for the processor and memory. Now co...
Questions
question
Mathematics, 05.02.2020 12:05
question
Mathematics, 05.02.2020 12:05
question
Mathematics, 05.02.2020 12:42