Can you give me some example of concurrent processes?
processes are concurrent if they exist at the same time.concurrent process can function completely indepently to one another.
two process are concurrent if their execution can overlap in time; that is, the execution of the second process starts before the first process completes.
concurrent processes generally interact through the following mechanisms:
Shared variables
Message passing
What is Google's mobile operating system?
Google's mobile oparating system is where you can phone in and say requests and stuff.
Leilah<3
Which operating system is open source linspire mac windows sun soaris?
Linspire no longer exists as it was taken over by Xandros in 2008. The Xandros system is a version of Linux and so is closest to an open source system but it has commercial elements that would not meet the requirements for a truly open source system. Sun Solaris no longer exists as Sun was taken over by Oracle. The Oracle Solaris system is part open and part closed source. Apple's Mac OS X is primarily closed source with several open source components. Windows is closed source but with some Shared source components.
What drives security system sales?
Long-term factors that drive security system sales are economic conditions, crime, sales and marketing prowess, disposable consumer income, and capital spending by businesses
How can you provide security to your system?
Depends on what system you use.
For windows you need to install an antivirus software and firewall.
You can always just get a GNU/Linux system like Linux Mint, which is secure out of the box.
In any case, you should avoid running software(programs) from untrusted sources.
What is the difference between buffering and blocking?
Explain the differences between buffering and blocking.
What is the Operating System of Google?
Google has produced two major operating systems.
Why the operating system important to the computer?
The operating system provides several important services:
Who design computer operating system?
The main operating systems today are designed by software engineers working at various technology companies. You're probably familiar with Apple and Microsoft on home computers. Red Hat, Oracle, and IBM also produce operating systems used in various commercial and industrial settings. Apple, Microsoft, Google, RIM, and Symbian are the big OS developers on smart phones.
There is no requirement that operating systems be made by a team of software engineers at a big company or a university though. Anyone who knows how to make one is welcome to make them and there are a number of operating systems in development today maintained entirely by people doing it as a hobby.
Why does memtest86 not require operating system support to run?
If it runs on the OS and it finds an error it is going to crash the OS software
What are 4 ways in which an operating system controls hardware and software on a computer?
as I remember it the main ways to control peripherals on a computer or computer based systems is software, mediumware, firmware and hardware, things may have changed since i was last at school, but it is worth checking out them all, mediumware may have evolved into firmware by now, but you never know, check it out :)
So essentially you have hardware which is controlled by its firmware, the firmware is what the operating system (mediumware)uses to control the hardware, and the software is the part that interacts with the operating system (mediumware) to make it possible for anyone to use the hardware in a nutshell.
What made GUI different from the DOS operating system?
DOS is fully command based operating system. we do every job in Dos by typing commands instead by using mouse clicks like todays computers. This is because of Using GUI (Graphic user interface). GUI make computers user friendly
As MS DOS is completely CLI (command line interface) based operating system hence it does not incorporate a GUI (graphical user interface) natively. This is the main difference.
How is database security different from system security?
System security is OS level security like you have username password to logon on your system.
Database security is db level security governed by your database software.like you have different schemas that have different passwords.You can decide grants and permissions for various db objects based on these db level users.
What is contiguous memory allocation in os?
Memory allocation: When a program asks for memory and gets it.
Contiguous allocation: When the memory is in one big block, for example memory addresses 1000-2000, as opposed to "fragmented allocation" where the memory comes as several smaller blocks in different places, for example memory addresses 1000-1050, 2050-2125, ...
Discuss the process of creation?
First we must understand that God does not do anything on the spur of the moment. He first plans what His intentions are and the reason for them. He will draw up a blue print so to speak. Designing everything from the tiniest flower to the greatest beast. There will also be a place for mankind in this blue print, as man is in the image of God there was no need to plan what he will look like. All other worlds ever created (Organized) were done in this manner by His will and by His pleasure. The process by which this world came to be is described in the Book of Genesis. Contrary to some of our learned men and women, man, beasts and all manner of living things did not evolve but were placed upon this earth as they were meant to be, each to his own kind and in their own season.
What does a mainframe operator do?
Monitoring the bacth execution, the system for errors, fixing them, administrating spool, depending on the company CICS , IDMS, CA7 monitoring and basic administrative tasks can be done, IPL-ing the machine, working with DASD, mounting/unmounting tape drives from the robot, configuring VPS printers (maybe) depending on the company, working with initiators, lines, nodes etc...
Source
Myself :D ( at the workspace )
5 What is the purpose of the command interpreter?
A command interpreter reads instructions from the user or from a file of instructions and executes them by converting them into one or more system calls.