Results for Operating System
What are the micro-instructions? Explain the different types of micros-instructions that can be used in a computer system. Explain the process of micro-instruction execution. What are the micro-instructions? Explain the different types of micros-instructions that can be used in a computer system. Explain the process of micro-instruction execution. Reviewed by enakta13 on September 11, 2012 Rating: 5

Write a program in 8086 assembly language that multiplies two single digit ASCII numbers. You must first convert these ASCII numbers to equivalent binary. The result of the multiplication must be converted to unpacked decimal number. This resultant unpacked binary coded decimal (BCD) number should have its units digit in AL register and tens digit in AX register

Write a program in 8086 assembly language that multiplies two single digit ASCII numbers. You must first convert these ASCII numbers to equ...
Write a program in 8086 assembly language that multiplies two single digit ASCII numbers. You must first convert these ASCII numbers to equivalent binary. The result of the multiplication must be converted to unpacked decimal number. This resultant unpacked binary coded decimal (BCD) number should have its units digit in AL register and tens digit in AX register Write a program in 8086 assembly language that multiplies two single digit ASCII numbers. You must first convert these ASCII numbers to equivalent binary. The result of the multiplication must be converted to unpacked decimal number. This resultant unpacked binary coded decimal (BCD) number should have its units digit in AL register and tens digit in AX register Reviewed by enakta13 on September 11, 2012 Rating: 5
Discuss in detail the Process management, Memory management, I/O and File management and Security and Protection in LINUX Operating System Discuss in detail the Process management, Memory management, I/O and File management and Security and Protection in LINUX Operating System Reviewed by enakta13 on August 28, 2012 Rating: 5
Describe why authentication is important for file protection. Describe why authentication is important for file protection. Reviewed by enakta13 on August 28, 2012 Rating: 5
List the security attacks that cannot be prevented by encryption. List the security attacks that cannot be prevented by encryption. Reviewed by enakta13 on August 28, 2012 Rating: 5
There is a total of 15 units of Rl (resource 1) and 7 units of R2 and the system is in the following state (again call it SO): There is a total of 15 units of Rl (resource 1) and 7 units of R2 and the system is in the following state (again call it SO): Reviewed by enakta13 on August 28, 2012 Rating: 5
What will be the number of page faults for the algorithms (FIFO, LRU and Optimal) for the following page reference string: 1,2,3,3,5,1,2,2,6,2,1,5,7,6,3 for a memory with 4 frames? What will be the number of page faults for the algorithms (FIFO, LRU and Optimal) for the following page reference string: 1,2,3,3,5,1,2,2,6,2,1,5,7,6,3 for a memory with 4 frames? Reviewed by enakta13 on August 28, 2012 Rating: 5

Search your question

Powered by Blogger.