
Explanation of Solution
Need of business professional to know about computer software:
The business professional must know about the various software components in order to manage the various resources which are discussed as follows:
Each computer has the operating system that are nothing but the computer programs used for the management of the various computer resources.
- The operating system plays an important role for the function of various system performances such as read operation, write operations and allocation of main memory and to perform the swapping of memory, responding to error and exception handling and to perform the backup, recovery of the resources.
- The operating system is also responsible for managing the various input and output devices such as the display, keyboard and mouse and to control other external devices.
- Software is needed for the maintenance of the functionalities of clients and server and it is necessary for the functioning of both the application of client and server.
- The application of the software can be useful in organization. The server operating system is the computer operating system that has been designed specifically for the configuration of server.
- The UNIX operating system can also be possible to implement on the servers. However the Linux operating system is also very useful in many organizations because it’s free and open source nature of the operating system and it’s easy to configure compared to the Microsoft server implementations.
Virtualization:
Virtualization can be defined as the process in which one computer system can appear as many computer systems. It is possible for one operating system that is known as host operating system to run as one or more operating system as the applications.
- The operating system that has been hosted is known as the Virtual machine where more than one operating system can be operated and each virtual machine can have their system resources allocated to it.
Types of virtualization:
There are three types of virtualization which are as follows:
PC virtualization:
- It is the process of virtually installing more than one operating system in a single personal computer.
- The user can be able to install more than one Operating System (OS) using some virtualization software such as VMware and both the OS can share the same system resources.
Server virtualization:
- The server virtualization is the process of hosting more than one server computer into a single server computer.
- The user can virtually host two virtual machines where each machine can act as server computer.
Desktop virtualization:
- The term desktop virtualization is the process of installing many operating systems for desktop in a single server...

Want to see the full answer?
Check out a sample textbook solution
Chapter 4 Solutions
Using MIS (10th Edition)
- Question D.4: FIFO Page Replacement Consider the following page reference string: e, c, b, e, a, g, d, c, e, g, d, a Considering 4 frames, fill in the following table and then answer how many page faults would occur with the FIFO page replacement algorithm. RS: reference string; FO: frame 0, F1: frame 1, etc. Hint: all frames are initially empty, so your first unique pages will all cost one fault each. Time 1234567891011 12 RS e cb e agd ce g d a FO F1 F2 F3 Page fault? b) Total # page faults: c) Briefly (1-2 sentences) explain Belady's Anomaly that can occur in FIFO Page Replacement.arrow_forwardConsider a system that uses a fixed-partition scheme, with equal partitions of size 2" bytes, and the main memory has 2¹8 bytes. A process table is maintained with a pointer to the resident partition for each resident process. How many bits are required for the pointer in the process table? Show all your steps.arrow_forwardUse the same semaphore notation shown above to describe how we can ensure the execution order of the following process execution graph: P6 P2 P7 P1 P3 P4 P5 Use all of the following semaphores in your answer: s1=0; s2=0; s3=0; s4=0; s5=0; s6=0;arrow_forward
- Consider the set of process: Process ID Arrival Time Burst Time P1 0 5 P2 0 10 P3 + 15 P4 18 10 P5 22 20 a) Draw the GANTT chart for the Round Robin time quantum -5) scheduling algorithm. Use the same implementation you used for the programming assignmenti.e. the processes should always run in PID order. Assume there is no context-switch overhead. Show your work for partial credit. b) Write your answer to the following performance metrics given your above CANTT charts. Show your work for partial credit. Average Response time: Average Wating time: Average Turnaround time:arrow_forwardConsider a file currently consisting of 10 blocks. Assume that the file control block and the new block information to be added are already in memory. Calculate how many disk I/O operations are required for the linked allocation strategy, if, for one block, the following conditions hold: HINTS: 1) ignore disk I/O associated with the file control block. 2) each read and each write is an explicit disk I/O. 3) assume a pointer to the end of the list for linked allocation a. The block is added at the beginning. b. The block is added in the middle. c. The block is added at the end. d. The block is removed from the beginning. e. The block is removed from the middle. f. The block is removed from the end.arrow_forwardSegment Base (original) Length Base (after compaction) 0 100 300 1 1400 600 2 450 100 3 3200 80 4 2200 500 5 3300 33 1. Given the original base addresses, what are the physical addresses for the following logical addresses? If it's an invalid address, just write "invalid". Note that (X, Y) => segment X, offset Y a) (0,350) b) (1,599) c) (2,50) d) (3,81) e) (4,300) f) (5.0) g) (5,34)arrow_forward
- Process Allocation A Max BCDABC D A Available B C PO 3 0 2 1 4 2 4 2 1 0 0 P1 0 1 0 1 0 2 2 2 P2 1 2 0 0 3 2 1 0 P3 0 1 1 2 1 1 1 2 P4 0 0 1 1 1 - 0 2 1 a) What is the content of the matrix Need? Process PO P1 P2 P3 P4 A Need BC D D ° b) Is the system in a safe state? If yes, give a safe sequence of processes. If not, explain why the system is not in a safe state. c) If a request from process P4 arrives for (1,0,0,0), can the request be granted immediately? Please state the reason.arrow_forwardConsider N processes sharing the CPU in a round-robin fashion (N>=2). Assume that each context switch takes S ms and that each time quantum is Q ms. For simplicity, assume that processes never block on any event and simply switch between the CPU and the ready queue. Also, assume that a process is still in the ready queue while a context switch is happening. a) What happens if Q is much smaller than S? What happens when Q→→ ∞, i.e. is much larger than the maximum turnaround time of all the processes? Be brief (1-2 sentences max) in your answer. b) If you use RR for scheduling, which of the three performance metrics (waiting, response, turnaround time) is more likely to be improved? Why (1-2 sentences max)?arrow_forwardCompute the jackknife estimate of bias and standard error for the correlation statistics from the law82 data using r languagearrow_forward
- Question D.1: Effective Access Time A computer keeps its page tables in memory. Memory access time is 100 nanoseconds (ns). Answer the following questions about the performance of this setup. Show your work. a) What is the effective access time (i.e. reading a word in memory) with no caching and a two-level page table? b) Consider the above scenario but with a TLB having a cache hit rate of 98%. If the TLB takes 20 ns to access, what is the effective access time of this setup when considering this TLB?arrow_forwardThe data law82 in bootstrap library contains LSAT and GPA for 82 law schools. 1. Write you own R code to estimate the correlation between LSAT and GPA scores, and compute the bootstrap estimate of the standard error and bias of the sample correlation. 2. Use the boot function in boot library to compute the bootstrap estimate of the standard error and bias of the sample correlation. Compare your results in 1 with the function output. using r languagearrow_forwardi would like to get help to resolve the following casearrow_forward
- Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningEnhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage Learning




