Nt1210 Chapter 1 Summary

Better Essays
1
The resources that should be maintained carefully are
a. Mainframes: memory and CPU resources, storage, network bandwidth.
b. Workstations: memory and CPU resources
c. Handheld computers: power consumption, memory resources.
2
A network computer totally depends on a centralized computer for most of its services which it performs. A network computer can therefore have a minimum use of operating system to manage its resources. But a personal computer has to be capable of providing all of the required functionality in a standalone manner without relying on a centralized manner. Which require high administrative cost and where sharing leads to more efficient use of resources are precisely those settings where network computers are preferred than the traditional personal computers.
3
An interrupt is a hardware-generated change-of-flow within the system. An interrupt handler is send to deal with the cause of the interrupt, control is
…show more content…
System calls are used whenever a program needs to access a restricted resource.
2
The purpose of system programs is that system programs can be thought of as bundles of useful system calls. They provide basic functionality to users so that users do not need to write their own programs to solve common problems.
3
The three general methods for passing parameters to the operating system
1) Pass parameters using registers (directly).
2) Store the parameters in a table in memory and the table address is passed in a register to the OS.
3) Push (store) the parameters onto a stack (by the program) and "pop" off by the Operating System.
4
The five major activities of an operating system with regard to file management are
1. File creation and deletion.
2. Directory creation and deletion.
3. Primitives for file/directory manipulation.
4. Mapping files onto secondary storage.
5. Backup files on stable state.

You May Also Find These Documents Helpful

  • Good Essays

    Unit 16 Ao1

    • 529 Words
    • 3 Pages

    All programs are written to do something, their purpose may be to perform a calculation or to run a computer game, but all programs will perform a task, also known as a process. All programs take the stricter of input, process to output. Th input includes user controls such as keyboard, mouse, game controller, voice and so on. It will also include data from the user, computer or other programs.…

    • 529 Words
    • 3 Pages
    Good Essays
  • Better Essays

    4) Assume that a pseudocode program contains the following module: Module display( Integer arg1, Real arg2, String arg3) Display " Here are the values:" Display arg1, " ", arg2, " ", arg3 End Module…

    • 1580 Words
    • 11 Pages
    Better Essays
  • Good Essays

    Nt1210 Chapter 1 Review

    • 1315 Words
    • 6 Pages

    5. This chapter describes the concepts behind how a CPU reads the contents from RAM. Which of the following is true about the process of read data. As described in the chapter?…

    • 1315 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Psychology

    • 342 Words
    • 2 Pages

    3.)You are scheduled to present the results of your work on creating a new software program for your company. What memory techniques will you use in order to be free of too much dependence on notes and PowerPoint slides? Be specific as to how you will relate the technique to the content of the presentation.…

    • 342 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Some OS routines directly support application programs as they run and thus must be resident. Other transient routines are stored on disk and read into memory only when needed. Fixed-length partitions can also be used to allocate the set amount of memory that a particular program needs to run. Under dynamic memory management, the transient area is treated as a pool of unstructured free space. When the system decides to load a particular program, a region of memory just sufficient to hold the program is allocated from the pool. Using segmentation, programs are divided into independently addressed segments and stored in noncontiguous memory. Paging breaks a program into fixed-length pages.…

    • 7085 Words
    • 29 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Chapter 3

    • 251 Words
    • 2 Pages

    1. How does a multipoint circuit differ from a point-to-point circuit? A multipoint circuit differs from a point-to-point circuit in that it is many computers connected on the same circuit while the point-to-point goes from one computer to another. P2P can also be more expensive if the computers connected are far apart.…

    • 251 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 8.1 Summary

    • 346 Words
    • 2 Pages

    The final device is an Arduino-based ball sorter that uses a two-stage approach to sorting the balls. The device starts by isolating a single ball and measuring its weight. Afterwards, the device categorizes the ball based on the measured weight and deposits it in the appropriate receptacle.…

    • 346 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    memory management paper

    • 463 Words
    • 2 Pages

    Relocation is processes of adjustment of program addresses to match actual physical addresses where program resides in memory when program process is executed. Reasons relocations is required because computer programmers no knowledge of other programs processes exist in resident memory upon execution of a program (Stallings, 2012). Computer programmers prefer to swap active processes to and from main memory to optimize computer processor utilization providing pool of ready program processes for execution (Stallings, 2012). When a program process is switched to disk, location hard to determine when switched back in, requiring program process placement in same location in main memory when program process first executed. Computer programmers may require relocation of process within a different area of memory. Operating systems responsible for managing, and process into main memory, and requires known location process control information of execution stack. Entry point begins with execution of program process. Branch instructions consist of address referencing instructions to execute next process. Data reference instruction contains bytes, and words of data referenced. Computer processor hardware and operating system software requires the ability to translate memory references in code of program into memory addresses reflecting current location of program in main memory.…

    • 463 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Lan-Based System

    • 6930 Words
    • 28 Pages

    According to indiastudychannel.com, the importance of a Computer Network is it allows the user to share data with other users in a network, for example, a company having a number of computers which are connected in a network. Computer network will enable the users to share the files and folders and get synchronized with other users.…

    • 6930 Words
    • 28 Pages
    Powerful Essays
  • Good Essays

    Priority Interrupt

    • 2015 Words
    • 9 Pages

    Establishing the priority of the interrupt can be through software or hardware. A polling process is used to identify the highest…

    • 2015 Words
    • 9 Pages
    Good Essays
  • Satisfactory Essays

    Q6-Briefly describe three different ways to connect to the internet. What are the advantages and disadvantages of each approach ?…

    • 669 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Chapter 8 Summary 2

    • 758 Words
    • 3 Pages

    In Neil Postman’s book, Amusing Ourselves to Death, he attempts to persuade Americans that television is changing every aspect of our culture and world. In chapter 8, Shuffle Off to Bethlehem, Postman uses three arguing styles very well: ethos, pathos, and logos, which help him push the reader, specifically televised religion viewers and churchgoers, to believe that televised religion is not a replacement for religion.…

    • 758 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Unit 59 Assignment 3

    • 645 Words
    • 3 Pages

    An interrupt is used when you want to quickly get the chips (CPU) attention at hardware level for a short amount of time when the value set has been meet (this is great as this removes barriers as stated on matrixtsl.com, you can with your program wake the controller when it’s in a low power state which you can’t do at software level). An interrupt works when you are running a program on an endless loop and meets a certain condition set in the program, this triggers the interrupt which will tell the CPU at hardware level (quicker than software level) to go to the sub program and once finished processing the sub-program, it will return back to the main program.…

    • 645 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The computer stores a program while the program is running, as well as the data that the program is working with, in ______________.…

    • 259 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    NT1210 Chapter 6 Summary

    • 1603 Words
    • 7 Pages

    Backbone Network: Connecting all of the LANs of an organization entails another type of network (BN). A properly designed backbone network provides a high-speed circuit that serves as the central conduit across which the LANs of an organization can communicate. They can also be used to connect LANs within a building, across a campus, and, increasingly, across much greater distances. A BN, as indicated by its name, is a network of its own. Besides connecting the various network segments, the backbone may have its own devices that can be accessed by other network segments…

    • 1603 Words
    • 7 Pages
    Powerful Essays