subject

Given the memory configuration in FIG 2.11, answer the following questions. At this point, Job 4 arrives requesting a block of 100K.
Operating System 20K
Job 1 (10K) 30K
50K
Job 2 (15K) 65K
75K
Job 3 (45K) 120K
200K
a. Can Job 4 be accommodated? Why or why not?
b. If relocation is used, what are the contents of the relocation registers for Job 1, Job 2, Job 3, after compaction?
c. What are the contents of the relocation register for Job 4 after it has been loaded into memory?
d. An instruction that is part of Job 1 was originally loaded into memory location 55k. What is its new location after compaction?
e. An instruction that is part of Job 2 was originally loaded into memory location 55k. What is its new location after compaction?
f. An instruction that is part of Job 3 was originally loaded into memory location 80k. What is its new location after compaction?
g. If an instruction was originally loaded into memory location 110k, what is its new location after compaction?

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 08:00
Digital information is stored using a series of ones and zeros. computers are digital machines because they can only read information as on or off –1 or 0. this method of computation is known as the system
Answers: 1
question
Computers and Technology, 22.06.2019 17:30
1. before plugging in a new device to a computer you should unplug all other devices turn off the computer turn on the computer 2. many of the maintenance tools for a computer can be found in the control panel under administrative tools display personalization
Answers: 1
question
Computers and Technology, 23.06.2019 17:10
Ac++an of of pi. in , pi is by : pi = 4 – 4/3 + 4/5 – 4/7 + 4/9 - 4/11 + 4/13 - 4/15 + 4/17 . ., to pi (9 ). , if 5 to pi,be as : pi = 4 - 4/3 + 4/5 - 4/7 + 4/9 = 4 – 1. + 0.8 - 0. + 0. = 3.. atoofbe to pi?
Answers: 2
question
Computers and Technology, 24.06.2019 05:30
Hey i really need some solving this problem: 1. encrypt this binary string into cipher text: 110000. include in your answer the formula the decoder would use to decrypt your cipher text in the format (coded answer) x n mod (m) = y & 2. decrypt this cipher text into a binary string: 106 you.
Answers: 2
You know the right answer?
Given the memory configuration in FIG 2.11, answer the following questions. At this point, Job 4 arr...
Questions
question
Mathematics, 26.03.2021 21:10
question
Mathematics, 26.03.2021 21:10
question
English, 26.03.2021 21:10
question
Mathematics, 26.03.2021 21:10
Questions on the website: 13722367