1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mnenie [13.5K]
3 years ago
7

Five jobs arrive nearly simultaneously for processing and their estimated CPU cycles are, respectively: Job A = 2 ms, Job B = 12

ms, Job C = 15 ms, Job D = 7 ms, and Job E = 3 ms.
Using FCFS, in what order would they be processed? What is the total time required to process all five jobs? What is the average turnaround time for each of these five jobs?
Computers and Technology
1 answer:
Paha777 [63]3 years ago
7 0

<u>This is an example with solution:</u>

Five jobs arrive nearly simultaneously for processing and their estimated CPU cycles are, respectively: Job A = 12, Job B = 2, Job C = 15, Job D = 7, and Job E = 3 ms.

a. Using FCFS, and assuming the difference in arrival time is negligible, in what order would they be processed? What is the total time required to process all five jobs? What is the average turnaround time for all five jobs?

Answer: The order of processing for the given jobs = A->B->C->D->E.

Total time needed to process all the jobs = 12+2+15+7+3 = 39 ms.

Turn around time for job A = 12 ms.

Turn around time for job B = 15 ms.

Turn around time for job C = 30 ms.

Turn around time for job D = 37 ms.

Turn around time for job E = 40 ms.

Answer : Therefore, the average turnaround time = (12+15+30+37+40)/5 = 26.8 ms.

You might be interested in
What is the role of a control in a system that is functioning correctly
iren2701 [21]
A control system manages, commands, directs, or regulates the behavior of other devices or systems using control loops. It can range from a single home heating controller using a thermostat controlling a domestic boiler to large industrial control systems which are used for controlling processes or machines.
4 0
3 years ago
Knowing how to develop an outline well is very easy, and most students can create quality outlines in one attempt. Please select
vovangra [49]

Its False, just took the test I chose true buh it told me I was wrong so iss gotta be false.

8 0
4 years ago
Read 2 more answers
How to write "There are four parking spots on campus that may be used only by Nobel Prize winning faculty." this sentence correc
dexar [7]
"On campus there are four parking spots, that may only be used by Nobel Prize winning faculty"

That's how I would write the sentence.
5 0
4 years ago
Emilee is watching an online video. The video is being sent to her laptop by a server over the Internet which splits the video i
Tresset [83]

Answer:

The answer is "Option C".

Explanation:The packet includes clients and modifies information both of these are often referred to as the payload. To achieve payload data by monitor data to get the control signals. It is a unit that will be an information material consisting of a specific network path into such a single packet and web browser transmissions and other types of networks will be used in the IP transmissions, in this, the data packet may arrive in out of order, and the wrong choice can be defined as follows:

  • In choice A, when the connection is good so, all the data is sent on the computer, that's why it is incorrect.
  • In choice B, It is wrong because it can't send back to the server.
  • In choice D, It can't be sent in order, that's why it is wrong.  
6 0
4 years ago
Which would be a responsible use of technology used by victims of cyberbullying?
IrinaVladis [17]

Answer:

Changing password and screen names regularly.

Explanation:

The cyber attacks have been common in this age. The technological advancements have eased our lives but also create hundreds of risks. These risks can include cyber bullying. The best way to keep your self away from being victim of such threat is by changing passwords regularly. This reduces the chance of hacking passwords and cyber bullying.

5 0
3 years ago
Read 2 more answers
Other questions:
  • The ____ provides access to the Internet may also be internal.
    14·2 answers
  • Where can information on metalworking occupations be found?
    14·2 answers
  • A (n) _____________ chart is represented by a circle divided into portions.
    8·1 answer
  • What is the home enabled button view id in toolbar in android?
    10·1 answer
  • Gross Domestic Product (GDP) is the economic report card for any country. What is the report card measuring?
    6·1 answer
  • a) Write a program that prompts for an integer—let’s call it X—and then finds the sum of X consecutive integers starting at 1. T
    6·1 answer
  • You give an object a more meaningful name by setting the object’s _________________ property.
    7·1 answer
  • According to what theory did the universe expand explosively into existence 13.7 billion years ago?
    13·2 answers
  • In which area is composing for games similar to composing for
    14·1 answer
  • Write a class Bug that models a bug moving along a horizontal line. The bug moves either to the right or left. Initially, the bu
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!