Technical Questions

Q:

Describe the Buddy system of memory allocation.

Answer

Free memory is maintained in linked lists, each of equal sized blocks. Any such block is of size 2^k. When some memory is required by a process, the block size of next higher order is chosen, and broken into two. Note that the two such pieces differ in address only in their kth bit. Such pieces are called buddies. When any used block is freed, the OS checks to see if its buddy is also free. If so, it is rejoined, and put into the original free-block linked-list.

Report Error

View answer Workspace Report Error Discuss

1 3483
Q:

How would you use the function memmove()?

Answer

#include "mem.h"


#include "alloc.h"


main()


{


      int area;


      char *dest;


      char src[] = "Life is the camera and you are the target"


                                  "so keep smiling always";


      area = sizeof (src);


      dest = malloc (area);


      memmove (dest, src, area);


      printf("\n%s", dest);


      printf("\n%s",src);


}

Report Error

View answer Workspace Report Error Discuss

Subject: Programming

1 3463
Q:

Explain the meaning of mutex.

Answer

Mutex is the short form for ‘Mutual Exclusion object’. A mutex allows multiple threads for sharing the same resource. The resource can be file. A mutex with a unique name is created at the time of starting a program. A mutex must be locked from other threads, when any thread that needs the resource. When the data is no longer used / needed, the mutex is set to unlock.

Report Error

View answer Workspace Report Error Discuss

0 3461
Q:

What is Beaconing?

Answer

The process that allows a network to self-repair networks problems. The stations on the network notify the other stations on the ring when they are not receiving the transmissions. Beaconing is used in Token ring and FDDI networks.

Report Error

View answer Workspace Report Error Discuss

Subject: Networking
Job Role: Network Engineer

2 3451
Q:

The "curse of dimensionality" relates to which problem of using operational data for BI reporting?

A) Dirty data B) Inconsistent data
C) Too much data D) Non-integrated data
 
Answer & Explanation Answer: C) Too much data

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Database

0 3440
Q:

What is RAID?

Answer

A method for providing fault tolerance by using multiple hard disk drives

Report Error

View answer Workspace Report Error Discuss

Subject: Networking
Job Role: Network Engineer

5 3405
Q:

What is the difference between routable and non- routable protocols?

Answer

Routable protocols can work with a router and can be used to build large networks. Non-Routable protocols are designed to work on small, local networks and cannot be used with a router

Report Error

View answer Workspace Report Error Discuss

Subject: Networking
Job Role: Database Administration

0 3402
Q:

In the context of memory management, what are placement and replacement algorithms?

Answer

Placement algorithms determine where in available real-memory to load a program. Common methods are first-fit, next-fit, best-fit. Replacement algorithms are used when memory is full, and one process (or part of a process) needs to be swapped out to accommodate a new program. The replacement algorithm determines which are the partitions to be swapped out.

Report Error

View answer Workspace Report Error Discuss

3 3395