Premium Essay

Nt1310 Unit 1 Essay

Submitted By
Words 640
Pages 3
Q1 What is the difference between a physical address and a virtual address?
Answer:

By physical address, we refer to the actual address of hardware physical memory (RAM). That means when a variable is stored at a physical address, that's the place where it's really stored in the RAM chip. If we are using physical addressing, a process also “knows” the entire layout of the physical memory.

With virtual addressing, all process memory accesses go to the Memory Management Unit, which then maps the virtual address to a physical one. This mapping is done by maintaining a table of virtual addresses and the corresponding Page Frame they belong. Also, if the Page Frame is not in memory, the table includes the mapping on the disk. That way every process has its own “private” address space, and no other process can read or write to that memory. Additionally, because it can use the disk to store Page Frames, the virtual memory size is independent of the actual …show more content…
After all, since there is no periodic clock interrupt, it may never get the CPU back.
Answer:

In user mode, since there is no periodic clock interrupts, timesharing cannot be enforced by the OS, as it can with processes. So, a polite programmer will allow other threads to run once in a while, by making his/her thread to give up the CPU.

Also, this is a good practice because it can prevent resource deadlocks. There are occasions where a thread must yield so that the process can continue when its resumed.

Q3 Instructions relating to accessing I/O devices are typically privileged instructions. Give a reason why these instructions are privileged.
Answer:

Freely allowing access to an I/O device might cause trouble for other processes. Making these instructions privileged is a mechanism that provides protection. A good example is the case where a process reads from the keyboard at the same time when a password is typed for an other

Similar Documents

Premium Essay

Nt1310 Unit 1 Essay

...Unit 1 Report Matt, an avid member of a local baseball rec league, is right handed and uses repetitive overhead motion when pitching the baseball. Wanting to impress his teammates, Matt tried to pitch the baseball as fast as he could. He immediately felt a snapping sensation in his shoulder and had sudden, intense pain in his upper arm. Upon a visit to an orthopedic physician, it was confirmed that he had a complete tear of one or more muscles in his right shoulder. Which group of muscles did Matt most likely tear? What are the individual names of the muscles comprised in this group? What is the function of these muscles and what are their attachment sites? Out of this group of muscles, which individual muscle is most often torn? • The rotator cuff is what Matt probably tore. There are a lot of baseball players that have this injury, especially with pitchers. The subscapularus muscle, infraspinatus and suprasoinatus muscle, teres major and minor muscles are the muscles that matt could have torn while pitching (Rotator). The shoulder joint connects to a lot of the ligaments and tendons most known as the glenohumeral joint (Primal). This type of injury because of the throwing in...

Words: 509 - Pages: 3

Premium Essay

Nt1310 Unit 1 Essay

...1) Using more advanced biological terms like GCK gene, hyperglycaemia, T1D that shows a higher standard of pre-existing knowledge to have already possessed. The usage of more complicated processes that a normal student would know. The usage of statistics such as diagnosing with diabetes using an HbAlc> 44mmol/mol(6.5%)- the precise levels of these different chemicals and the accurate percentages and amounts needed- this is something that scientists would only understand. 2) Microvascular – small vessels and macro vascular – big vessels. Symptoms usually start in childhood or young adulthood. People often seek medical help, because they are seriously ill from sudden symptoms of high blood sugar. The person may not have symptoms before diagnosis....

Words: 483 - Pages: 2

Premium Essay

Nt1310 Unit 1 Essay

...TM1 What are virtual dimensions and how do you create them? Virtual dimensions are useful when a report uses attributes from the same dimension as the rows and columns in a report. This eliminates creating a cube with the same attributes recreated as dimensions. Virtual dimensions are created using Turbo integrator with the help of CreateHierarchyByAttribute function What is the difference betweenTM1 reporting and Cognos Reporting? Cognos reads data from source and reports and not suitable for forecasting or budgeting. TM1 reads and can write back the data if needed through a template Turbo integrator/Architect Have you set up an element level security in TM1? How do you do that? Can do using Rule based or dimension/branch level. Brach takes much lesser time while refreshing, whereas Rule introduces overhead What is TM1 REST API? Can access TM1 data that traditional or old TM1 interface cannot do. Need JSON (JavaScript object notation viewer) to read the return data or use tool like postman What is the process for migrating Development to Production? There is no version control, so follow best practices Performance Have you developed splitting models having cubes in different session running on a different box? What are the draw backs? Sessions won't communicate with each other very well and data stored on each server session should probably be fairly independent What are feeders? They are part of the TM1 sparse calculation engine where cells are calculated by rule and make...

Words: 392 - Pages: 2

Premium Essay

Nt1310 Unit 1 Essay

...740 words. Question 3: “Describe the function of the following Docker commands and briefly explain the purpose of each of the parameters. docker run –d –p 8080:5000 –v $(pwd)/data:/data –name container1 lab4 Docker is a software containerization platform, that runs processes in isolated containers. The docker run command is used to define the containers resources at runtime. When the command is run, the container process is isolated. It is separate from the host itself. The –d command is an option run by Docker to communicate whether the container should be run in “detached” mode or in the “default mode”. The –d command signifies that the container should be run in detached mode, meaning the container will be run in the background. The next option used is –p. This is used to publish all exposed ports to the host interfaces. Docker, in turn, ‘binds’ each of the exposed ports to a host port, addresses of the published ports are 8080:5000. The –v command mounts the current working directory into the container. The –v command can be used multipule times to mount datat volumes. Here it is mounted once. The pwd command prints the working directory i.e. data:/data. The –name command assigns the name container1 lab4 as the container name. docker exec –it A637jd9dja /bin/bash The docker command docker exec runs a new command in an already running container. The command only runs while the containers PID (primary process) is running. If the container is paused the command...

Words: 741 - Pages: 3

Premium Essay

Nt1310 Unit 1 Homework Essay

...1. State why it is a good idea to test a module in isolation from other modules? Because When unit system testing, each module unit is tested to resolve the accurate fulfillment of everything of the individual modules. It contains inquiring each module within isolation as this indicates the whole effective means to debug the mistakes acknowledged to this point. Therefore, it is perpetually a great way to examine a module in isolation from different modules 2. Why different modules making up a software product are almost never integrated simultaneously? because the purpose remains the Synthesis of various modules is undertaken once all have been coded and unit tested. Throughout the integration and system practice testing phase, the modules...

Words: 493 - Pages: 2

Premium Essay

Nt1310 Unit 1 Exercise 1 Essay

...then there exist two natural number $m$ and $n$ such that $\sqrt{2} = \frac{n}{m}$ where $m \neq 0$ and the greatest common divisor of $m$ and $n$ is 1. Now, $\sqrt{2} = \frac{n}{m}$ implies $2 = \frac{n^2}{m^2}\ \Rightarrow n^2 = 2m^2$. The number $n^2$ is even because is equal to 2 times something, also $n$ is even, since even number times even number is always an even number. This means that $n$ can be written as $2k$ for some $k\in \textit{N}$. Substituting $n = 2k$ in $2 = \frac{n^2}{m^2}$ yield $2 = \frac{4k^2}{m^2} \Rightarrow m^2 = 2k^2$,...

Words: 1203 - Pages: 5

Premium Essay

Nt1310 Unit 1 Activity 1 Essay

...%\addcontentsline{toc}{section}{Activity 1.12} \section*{Activity 1.12} In this activity, we want to explore what happens to the product when we multiply two numbers and then increase the first number by 1 and decrease the second number by 1. \begin{enumerate} \item \textbf{{\large When we multiply a number by itself!}}\\ \begin{tabular}{|c|c|} \hline A & B\\ \hline $7\times 7 = 49$ & $8\times 6 = 48$\\ \hline $8\times 8 = 64$ & $9\times 7 = 63$\\ \hline \end{tabular} The general equation for this problem can be written as follows!\\ If $x^2 = k$, then $(x+1)(x-1) = k-1$\\ General statement!\\ If we multiply a number by itself and the product is equal to $k$, and then we increase the first number by 1 and decrease...

Words: 1413 - Pages: 6

Premium Essay

Nt1310 Unit 1 Rule Essay

...Example of Rule on a Listed Tree-Rule Firewall For example, Rule-3 in Table1 is a shadowed rule because any packet that matches this rule has already matched Rule-1 in order of precedence. 1.3.2. REDUNDANT RULE: If more than one rule can do the same action in the set of rules is called redundant rule, otherwise one rule is redundant to another rule with the same action. For example, Rule-8 in Table 1 is redundant to Rule-9. The firewall policy won’t change while removing a redundant rule. It will waste the firewall processing time and it leads to speed problem and also it require lot of memory to store the redundant rule. Without any change in the firewall policy, we can able to delete the redundant rules which are not necessary to check. 1.3.3. SWAPPING THE RULE POSITION: In Listed-Rule firewall if two rules have different action then swapping the position of that rule can cause policy changes on the firewall and both of them can be matched with the same packet. For example, swapping between Rule-7 and Rule-8 (see Table 1) will change the action on the packet (with Source IP = 172.3.3.9, Destination IP = 20.3.3.9, Destination Port = 80) from being accepted to being...

Words: 1317 - Pages: 6

Premium Essay

Nt1310 Unit 1 Homework Essay

...1. State why it is a good idea to test a module in isolation from other modules? Because When unit system testing, each module unit is tested to resolve the accurate fulfillment of everything of the individual modules. It contains inquiring each module within isolation as this indicates the whole effective means to debug the mistakes acknowledged to this point. Therefore, it is perpetually a great way to examine a module in isolation from different modules 2. Why different modules making up a software product are almost never integrated simultaneously? because the purpose remains the Synthesis of various modules is undertaken once all have been coded and unit tested. Throughout the integration and system practice testing phase, the modules are combined in a prepared way. The different modules making up a software output are virtually never combined within one shot. Integration is commonly displayed out incrementally across a number of levels. Through each integration step, the partly integrated system is examined and a set of previously prepared modules are added...

Words: 556 - Pages: 3

Premium Essay

Nt1310 Unit 1 Case Analysis Essay

...You have asked the following questions: “A local jurisdiction is stating that the system with three loops meets the requirements for a grid system per NFPA 13D. This would require hydraulic calculations per NFPA 13 by 10.4.6. Is it the intent of NFPA 13D to calculate these systems per NFPA 13? Currently, we calculate these systems with a two-head hydraulic calculation per NFPA 13D section 10.2.1. We calculated all points of connection between the loops as indicated with the hydraulic node placement for all lengths, fittings, and pipe sizes throughout the system and through all paths. Would this application require more than a two-head calculation? Also, is the intent of NFPA 13D to change the number of heads that need to be hydraulically calculated for grid and loop systems?” In response to your question, we have reviewed the 2016 editions of NFPA 13 and NFPA 13D that you indicated as the applicable standards. Our informal interpretation is that your two-sprinkler design approach meets the intent of NFPA 13D. This is indicated by 10.2.1 where the design area shall be all of the sprinklers within a compartment, up to a maximum of two sprinklers that require the greatest hydraulic demand. This section then provides five different architectural ceiling applications where this criterion applies. The piping configuration to the two sprinklers can be gridded per 10.3.2. The general pipe sizing method of 10.4.4 and the prescriptive pipe sizing method cannot be used since the piping...

Words: 375 - Pages: 2

Premium Essay

Nt1310 Unit 10 Lab 1 Essay

...NT1310 Codi Roebuck Unit 10 Lab 1 01/04/2016 Professor: Ronald j. wojcik Fiber optics for diagnostics and troubleshooting are used in varying capacities to test, measure, analyze, transmit, distribute, and/or simulate an optical signal with which the technician can perform procedures and processes associated with maintenance, problem solving, and calibration of equipment and/or networks. Normally in these applications, fiber optic products are used to create loop tests or transmit signals from point-to-point (either single-point to single-point, or single-point to multiple-points). For loop testing, commonly referred to as loopback testing, a signal is sent from a piece of equipment through a loopback or cable and returned to the source, simulating a complete network connection. This type of test allows technicians to perform function tests and internal diagnostic processes without the equipment being physically tied to an active network. This type of setup provides technicians with the advantage of easily isolating individual components for faster, more comprehensive analysis. With signal transmission applications, technicians generally use cables (multiple types for different applications) to connect one or more pieces of...

Words: 678 - Pages: 3

Premium Essay

Telecommunications

...Exercise One Nt1310 Week 1 In: Computers and Technology Exercise One Nt1310 Week 1 NT1310:Week 1 Telecommunications By: Kenneth Martin You are an IT Network Specialist and are required to develop the design of the company’s telephone system for its new building which will begin construction in a few months. In order to get a background which will help when developing the new system, your supervisor asked you to research the current Plain Old Telephone Service (POTS) currently used by the company. You must research the system components and report back to your supervisor , the Telecommunications Manager, within a week. 1. Describe a local land line phone system based on the following Landline Telephone Components: a. Local Loop a local loop is the wired connection from a telephone company's central office in a locality to its customers' telephones at homes and businesses. This connection is usually on a pair of copper wires called twisted pair. The system was originally designed for voice transmission only using analog transmission technology on a single voice channel. Today, your computer's modem makes the conversion between analog signals and digital signals. With Integrated Services Digital Network (ISDN) or Digital Subscriber Line (DSL), the local loop can carry digital signals directly and at a much higher bandwidth than they do for voice only. b. Central Office In telephone communication in the United States, a central office (CO) is an office in a locality...

Words: 496 - Pages: 2

Premium Essay

Fsmo Role Ayer Nate Method

...have one domain controller (not recommended), there is nothing to do since all roles must be on this server, but if you have multiple servers you should move some of theese roles on to more servers. It is also important to be aware of what servers are Global Catalog servers, especially if you have more than one domain and even if only one domain, they will be prefered by applications like Exchange server. It is recommended to place the forest roles on one Domain Controller (DC) and the domain roles on another server. If not all Domain Controllers are Global Catalog servers, it is also important to place the infrastructure master on a server that is NOT a Global Catalog server. Recommended Best Practice setup of FSMO roles. Domain Controller #1 Place the two forest roles on this server. * Schema Master * Domain Master Domain Controller #2 Place the domain roles on this server. * RID Master * Infrastructure Master * PDC Emulator If more domains exist in the forest, place the domain roles on a server in theese domains like Domain Controller #2 Global Catalog configuration. In Windows 2008 Active Directory all Domain Controllers are by default Global Catalog servers, personally...

Words: 10360 - Pages: 42