1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anastassius [24]
3 years ago
9

Draw a timeline for each of the following scheduling algorithms. (It may be helpful to first compute a start and finish time for

each job.) a. FCFS b. SJN c. SRT d. Round robin (using a time quantum of 5, ignore context switching and natural wait)

Computers and Technology
1 answer:
12345 [234]3 years ago
8 0

Answer:

See explanation below

Explanation:

Previos concepts

First Come First Serve (FCFS) "is an operating system scheduling algorithm that automatically executes queued requests and processes in order of their arrival".

Shortest job next (SJN), or the shortest job first (SJF) or shortest "is a scheduling policy that selects for execution the waiting process with the smallest execution time".

Shortest remaining time (SRF) "is a scheduling method that is a preemptive version of shortest job next scheduling'".

Round robin (RR) is an algorithm where the time parts "are assigned to each process in equal portions and in circular order, handling all processes without priority"

Solution for the problem

Assuming the dataset given on the plot attached.

Part a

For this algorithm the result would be:

Job A   0-6

Job B   6-(6+3) = 6-9

Job C   9-(9+1) = 9-10

Job D   10-(10+4) = 10-14

Part b

For this algorithm the result would be:

Job A   0-6

Job C   6-(6+1) = 6-7

Job B   7-(7+3) = 7-10

Job D   10-(10+4) = 10-14

Part c

For this algorithm the result would be:

Job A   0-1  until 14

Job B   2-(2+3) = 2-5

Job C   3-(3+2) = 3-5

Job D   9-(9+5) = 9-14

Part d

For this algorithm the result would be:

Job A   0-2 , 7-9, 12-14

Job B   2-4, 9-10

Job C   4-(4+1) = 4-5

Job D   5-7, 10-12

You might be interested in
Explain different users of computer in briefly?​
goldfiish [28.3K]

Answer:

The question is invalid; there are many types of computer user. Why on earth do you think there are five?

From the top of my head.

Casual- someone at home browsing the web, reading email.

IT Consultant. Advising people.

Software developer- writing software

Secretary - manages email for a company

Academic. Writing research papers.

Monitors. Monitor a computer system.

That’s six off the top of my head. There are probably a dozen more. So why do you think there are five?

3 0
2 years ago
8.
mario62 [17]

Answer:

<em>Lillipop</em>

Explanation:

If you have your hands correctly placed on the keyboard, the only hand needed to type the word, "lillipop", is the left hand!

<em>Hope I was of Assistance</em><u><em> #SpreadTheLove <3</em></u>

5 0
3 years ago
A threat analyst is asked about malicious code indicators. Which indicator allows the threat actor's backdoor to restart if the
joja [24]

Indicators of compromise enable system administrators and information security professionals to detect intrusion attempts or malicious activities.

Your information is incomplete as the options aren't provided. Therefore, an overview of indicators of compromise will be given.

Indicators of compromise means the pieces of forensic data that are found in files or system log entries to identify malicious activity on a network or system.

Indicators of compromise help IT and information security professionals to detect malware infections, data breaches, etc. Examples of indicators of <em>compromise</em> include log-in red flags, unusual outbound network traffic.

Read related link on:

brainly.com/question/25522987

8 0
3 years ago
A new company starts up but does not have a lot of revenue for the first year. Installing anti-virus software for all the compan
Feliz [49]

WAN domain which stands for Wide Area Network and consists of the Internet and semi-private lines. The <span>RISKS are: Service provider can have a major network outage, Server can receive a DOS or DDOS attack</span> and A FTP server can allow anonymously uploaded illegal software.





7 0
3 years ago
The letters a, e, i, o and u are the only vowels. Write a function named vowelUseDict() takes a string t as a parameter and comp
Andru [333]

Please specify the programming language.


3 0
3 years ago
Other questions:
  • &gt;
    6·1 answer
  • What is the maximum amount that OSHA can impose as a penalty on an employer for each Willful violation?
    11·1 answer
  • Xml is used to format the structure and style of a web page. true or false
    7·1 answer
  • How many cells does the organism have?\
    5·2 answers
  • Which of the following types of network can only be accessed by members within a private organization?
    5·1 answer
  • Which IEEE standards define Wi-Fi technology?
    10·1 answer
  • Which of these is an example of rebranding ?
    6·2 answers
  • You have this code in your program.
    7·1 answer
  • Que es tarjeta madre resumen porfa
    13·2 answers
  • What is the<br>Way to<br>keep the tool<br>Screw​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!