Other Programming & Computer Science Answers

Questions: 1 727

Answers by our Experts: 1 357

Need a fast expert's response?

Submit order

and get a quick answer at the best price

for any assignment or question with DETAILED EXPLANATIONS!

Search & Filtering

Operating System Questions

1.There is a ticket hall can accommodate 100 people. If it is less than 100 people in the hall, buyers can go into and buy tickets ,then leave the hall. If there have 100 people, then buyers should wait outside the hall. Now please answer the following questions:


(1)Is it synchronization or mutual exclusion between the buyers?

(2)Describe the process of buyers with wait() and signal() operation.



Using file handling write a program to construct a compiler that reads strings from file , check these strings and print a message that whether the string is accepted by the FA or not.(Compiler Construction Computer Science).


How do you create the pseudocode that will demonstrate how an application will write your name and surname to a text file called “students.dat”



Busiswe runs a small shop selling products that are produced by individuals working from their homes. She would like to have a database where she stores details of the products that she sells, the producers from which she buys, and a list of her customers that have a standing order. For each product, she would like to have a unique product number, a description of the product, and the cost price of the product. For the producers, she would like to know the producer's name and telephone number. For her customers, she would like to give each customer a unique number and store their name and birth date in the database. Each customer must have a separate standing order for each product that they want to be delivered every month. Each standing order will have a unique number, the product that is ordered, and the date that the order was placed. A customer cannot be added to the database if they do not have a standing order.

 

draw an ERD for the following case study.


Create the pseudocode that will demonstrate how an application will write your name and surname to a text file called “students.dat”.


Question Two (60 Marks) Answer the following questions 2.1 Evaluate the uses of computer in society. [10] 2.2 Identify any five functions of an operating system. [5] 2.3 The information cycle consists of four main processes list and briefly explain these four processes. [8] 2.4 Identify and explain the various types of storage devices. [12] 2.5 Explain the different types of Pointing Devices. [15] 2.6 Analyse the boot process [10]


Question One (15 Marks) Define the following terms and give examples 1.1 Information literacy [3] 1.2 Information system [3] 1.3 Computer software [3] 1.4 Operating system [3] 1.5 Graphical user interface [3]


Using a nano-chip technology an evil mad scientist discovers a way to enter and take control of the

minds and bodies of other individuals.

Demonstrate your knowledge of writing skills and creative writing and complete the above stated story.

Your story must include the following details:

• How will the scientist inject the nano- chips in the bodies of other individuals?

• What tasks will he ask the individuals to perform?

• How the law enforcing agencies will stop the scientist in accomplishing his task?

You may add further details but remember your answer should not be less than 300 words.


QUESTION 28

Which one of the following statements is NOT true regarding hashing methods for file 

searching?

1. In modulo division hashing, the key is divided by the file size and the remainder plus one is 

used for the address of the record.

2. In digit extraction hashing, selected digits are extracted from the key and used as the 

address of the record.

3. In direct hashing, no algorithmic manipulation is done, so the file must contain a record for 

each possible key.

4. Modulo division hashing guarantees no collisions or synonyms.

QUESTION 29

In file processing, collision occurs when…

1. ...the file is not big enough to hold all the data records.

2. …two files are open in memory at the same time.

3. …the data in the file contains two synonyms, i.e. two keys collide at the home address.

4. …the prime area is inaccessible.


LATEST TUTORIALS
New on Blog
APPROVED BY CLIENTS