Nt1330 Unit 3 Exercise 1 Summary

Decent Essays
1. What is the purpose of an interrupt?
Answer:
Interrupts are signals caused between execution.In other mean it is the signal sent to the CPU by external devices.It tell the CPU to stop its current activity and execute the specific part of the operating system. Interrupts are most important as they give user the better control over the computer. Without interrupts, a user have to wait for a given task to complete in a specific time management with the higher priotity.This ensures that the CPU will charge the process immediately. 2. What is a trap?
Answer: Software generated Interrupt Caused by an exception or by an explicit trap instruction (e.g. for a system call)
Mechanism to functions from supervisor mode. Mechanism to jump into
…show more content…
- LAN networking is used in Clustered system, in Multiprocessor system LAN etc. is not required.
- The aim is high availability in clustered system whereas in multiprocessing it is time saving.
- The processors share same system clock and common data structures.

7. What are three techniques that can be used to pass parameters to a system call?
Answer: This approach is to pass the parameters in registers.
In some other cases, there may be more parameters than registers. The parameters are generally stored in a block, or table in memory and the address the block is passed as a parameter in a register.
Parameters can be placed or pushed, into the stack by the program and popped off the stack by the operating system. 8. What is the small program that locates and loads the operating system for a computer called?
Answer: The small program that locates and loads the operating system for a computer is called as Bootstrap Loader. 9. Name three ways of structuring an operating system.
Answer: The three ways of structuring an operating system are: 1.Program

Related Documents

  • Improved Essays

    On october 12, 2015 at or about 1102 hours i was dispatched to 1735 east young circle (publix supermarket), hollywood florida, in reference to a cellphone being taken. Upon further investigation it was later found that the cellphone would equal the amount to grand theft (over $300.00usd). Let it be also noted during the time of this investigation, i was working an off-duty detail at the above location. Upon arrival i made contact with the james othman, herein after referred to as the victim. The victim advised me that at approximately 1051 hours his phone was taken from the customer service counter (located at the south side of the store).…

    • 587 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Due to the age of the existing equipment, four new Cisco Catalyst 3560 V2 24 port switches will be use and configure for network redundancy by connecting each switch in a multiple links, single IP address with routing protocol Border Gateway Protocol (BGP). This multi-homing will detect when one of the links fail and not send traffic over that link anymore until the issue is resolved. This redundancy configuration will meet Western County Bank management requirement reducing unplanned outages and regular maintenance performed on the network equipment supporting 10 GB links as well as static or LACP-based (link aggregation control protocol) network interface controller (NIC) teaming. The Time Warner Cable, Business, Dedicated Internet Access, and AT&T Uverse Business Internet service will provide redundancy to the Internet…

    • 452 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Ilab 5 jerry Metcalf Keller Graduate School of Management Professor: Gregory Gleghorn 6/4/2017 VPN Connection The type of VPN connection solution that we will be using to connect user to the internet work will be the Cisco Any connect client and the RSA secureID. We will be going in to detail of how the connection process goes and also how to configure it. Both clients are required in order for the user to authenticate and connect to the company network. When the user is connected they will be able to do their job remotely and send and retrieve information remotely.…

    • 678 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Implementing Firewall Filter Implementing firewall filters on a network makes the network free from attackers and very secured. Some of the boundaries that I will consider using on my firewall will be blocking ports on the network. First of all I will establish a new FTP session which the will initiate a connection to an FTP server that listens on TCP port 21 by default. This will help users on the network to login with user name and password before any data to port 21 will accepted. I will establish SSH(secure shell) which will provide a strong and secure communications over the network.…

    • 441 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Hi Hemant, USHDCWPBTD03 and USHDCWPBTD04 we are not using at full extend. Both the servers only use for “Single Sign on Feature”. Both the servers use 2 processor each (2 + 2 = 4). I am thinking if we remove 1 process from each server (1 + 1 = 2) we end up with 2 processer, this will save us some BizTalk cost.…

    • 63 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 3 Assignment 3

    • 1039 Words
    • 5 Pages

    Group I, Category 19 Incorrect RFC Decision ISSUE DDS proposed a denial determination. The evidence in file supports a more restrictive RFC, as a result, additional vocational documentation is required. CASE DISCUSSION & POLICY ANALYSIS (INCLUDING SPECIFIC REFERENCES) This 57-year old is filing a DIB claim alleging disability due to loss of right eye, COPD, high blood pressure, edema of both legs and feet, back surgery, weight gain, depression, and neuropathy, as of 10/22/2014.…

    • 1039 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    is a software-based protocol that provides a way to locate files, devices or even individual in a network. LDAP uses port 389 and is uses by Microsoft as the main protocol that opens up this type of access. LDAP is lightweight which indicates a smaller version with a smaller code and it is part of X.500. The latter acts as a standard for network directory services. /***************************…

    • 442 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Policy-based management: SQL server has a feature called policy-based management which is used to define and also implement policies in SQL server. It is used if we want to apply any policy against a table or database and then checks whether the database or table satisfies with the given policy. If target database objects are not satisfied with the policies then either a trigger should be fired or we can enforce it so that an administrator will come to know that there is some policy violation. It will manage one or more instances of SQL server.…

    • 391 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    SIP Trunking BroadConnect boasts its many years of experience and emphasis on customization. We take every business and design the best phone systems content for it, based on your needs and budget. Since we understand that communication is a major component of a successful business, you will never receive excessive or useless features that will only hinder your company’s ability to grow. Our network is prevalent throughout North America, and it uses converged T1 that is fast and reliable.…

    • 480 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Professor Doupé, Thank you for your reply, and for your questions. We are excited to potentially have your guidance in our research, and hope we have provided clear explanations to your questions below: 1. SSL/TLS encryption secures data flowing between client and server. Using SSL during an authentication attempt could provide a secure way for a non malicious server to authenticate with the device, while blocking out sign in attempts from malware. 2.…

    • 682 Words
    • 3 Pages
    Decent Essays
  • Superior Essays

    Please research one virus and one worm, and write a maximum 2-page single-spaced paper explaining what each of them is, what they do, what their impact was, what the mechanics of how they work are (the technical aspect), and how were they stopped. Computer virus: It is a piece of code which is loaded onto the computer without the user knowledge and runs itself. When this code is executed, it makes a copy of itself and inserts this copy into another computer programs, data files of the hard drive. Such small virus also steals hard disk space and CPU time , corrupts data.…

    • 1405 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    In Ernest Hemingway’s short story “Hills like White Elephants” He talks about two people, a couple who are in an argument and are passing back and forth the control of the argument. The argument at hand is about the abortion the American wants Jig (the girl) to have. Jig is on the fence about the abortion while the American is pushing her to have the “simple operation” so that the relationship with go back to how it was before the pregnancy, while Jig is not exactly sure she wants the procedure she tries to say that they can be happy even with the baby at which point she tries to turn the tables on the American by being passive so that she would get the answer she wanted out him; the American then says that he wants her to do whatever it is that she wants to and he will…

    • 814 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Do you use a computer? If so, chances are, you use at least one of the three major operating systems: Windows, Mac OS X and, Linux (pronounced “lyneks” or less commonly as “laineks”). With all three of them being around for at least 20 years, they have been here for a while. Although most people might not know what an operating system even is, every computer has one and, each one has its own pros and cons—which will attract different types of people. It 's important that you learn what an operating system is, what these pros and cons are and, become able to choose which one is right for you.…

    • 1648 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    Question 1 1.1) a) The dining philosophers is a theory thought up by E.W Dijkstra. He said that five philosophers sit at a circular dinner table with five chairs and five forks. Each philosopher wants to eat so they pick up 2 forks and after a while place them back on the table when they’re done.…

    • 1839 Words
    • 8 Pages
    Improved Essays
  • Great Essays

    Introduction Individuals today press a button or two and in order to power up a computer. Did any of the users stop to think about what is making this action of the computer happen? The computer also spends a great deal of time responding to the user. The one software program behind all of these actions is the operating system.…

    • 1966 Words
    • 8 Pages
    Great Essays