1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inessa05 [86]
3 years ago
9

Consider a swapping system in which memory consists of the following hole sizes in memory order: 10 MB, 4 MB, 20 MB, 18 MB, 7 MB

, 9 MB, 12 MB, and 15 MB. Which hole is taken for successive segment requests of (a) 12 MB (b) 10 MB (c) 9 MB for first fit
Computers and Technology
1 answer:
lyudmila [28]3 years ago
5 0

Answer:

a) 20 MB

b) 10 MB

c) 18 MB

Explanation:

First fit method works by keeping list of jobs which are ordered by memory location. This list of jobs contains free/busy status. Free means that hole is available and it takes the memory requests and busy is for the memory space is occupied.

In first fit method the first process takes the first available hole or memory with space greater than or equal to the size of the job. OS assigns process to nearest memory partition available with sufficient size.

For the request for 12 MB the hole with size 20 MB is taken as its nearest memory location of sufficient size than 10 and 4 MB. Now the status of this is busy as its taken by a job.

Next for the request of 10 MB the sufficient nearest memory hole is 10 MB as its equal to the size of the job. The status is changed to busy.

Next for the request of 9 MB the sufficient nearest hole is 18 MB as the 10 and 20 MB are already taken and 4 MB is not sufficient so the first sufficient available hole is of 18 MB.

You might be interested in
What section in an ethernet frame will you find a Virtual Local Area Network (VLAN) header?
Vadim26 [7]

Answer:

Preamble

Explanation:

In the computer network , the ether-net is the frame of link layer protocol data. This frame is used ether net with physical layer of transport mechanism. The ether net frame is of different type.

  • The ether-net II
  • The Novel raw IEEE 802.3
  • IEEE 802.2 LLC
  • IEEE 802.2 SNAP

Each of the Ethernet frame started from Ether net header. It contains the source and the destination. The MAC address is called its first two address.

8 0
3 years ago
The random module is a group of functions that are used to deal with random numbers.
maksim [4K]
True because it is the
5 0
3 years ago
Read 2 more answers
Which of the following statements about websites is NOT true?
Inga [223]
The correct answer choice would be letter B.

I hope that this helps !
6 0
3 years ago
Read 2 more answers
Which of the following allows computers to communicate with each other? RAM NIC Hard drive Floppy disk
alexandr402 [8]

Answer:

NIC (Network Interface Card)

Explanation:

A network interface card is used to connect a computer to a computer network allowing for data to be transmitted between computers.

8 0
3 years ago
How to combine multiple documents into one pdf.
sergeinik [125]

Answer:

How to combine and merge your files into one PDF: Open Acrobat DC to combine files: Open the Tools tab and select "Combine files." Add files: Click "Add Files" and select the files you want to include in your PDF. You can merge PDFs or a mix of PDF documents and other files.

Explanation:

8 0
2 years ago
Other questions:
  • What do u call a individual that loves motor bikes and leather and is in a rival group known as mods?
    5·1 answer
  • Can Someone give me a 5 paragraph essay about all of the uses in Microsoft Word.
    9·1 answer
  • A user found that their personal data had been exfiltrated from their computer by a malicious program that they clicked on sever
    12·1 answer
  • What is the relationship between a method and a function
    11·2 answers
  • The correct order of operations is _____. brackets, exponents, division, multiplication, addition, and subtraction subtraction,
    5·2 answers
  • Write a program that allows the user to play a guessing game. The game will choose a "secret number", a positive integer less th
    14·1 answer
  • QUESTION
    14·1 answer
  • Anyone have an answer for 4.9 lesson code practice
    9·1 answer
  • Anyone know how to delete that I need ASAP
    13·1 answer
  • Which two components are configured via software in order for a PC to participate in a network environment
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!