
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 1163 Articles for Computers

4K+ Views
Operating systems use the Not Recently Used (NRU) page replacement algorithm as a fundamental page replacement tactic to control memory. Its major goal is to locate and remove pages from memory that haven't been accessed in a while. In this article, we will be discussing the NRU page replacement algorithm, the classes in it, the steps involved, the use cases, and also its benefits. The NRU algorithm Classes Based on their usage or reference bit, pages are divided into four classes by the NRU algorithm − Class 0 − Since they were loaded into memory, pages cannot be referenced (accessed) ... Read More

1K+ Views
Operating systems assign memory to processes using the memory management strategy known as non-contiguous allocation. This method divides memory into fixed-size blocks or partitions, and each partition can be assigned to a process according to its needs in terms of size. The non-contiguous allocation permits a process's memory to be dispersed among several regions in the main memory, in contrast to the contiguous allocation, where a process occupies a single block of memory. When working with processes of varying sizes, this strategy offers greater flexibility and effective memory utilization. In this article, we will be exploring what is Non-Contiguous Memory ... Read More

744 Views
Operating systems use the scheduling algorithm non-preemptive priority scheduling to choose the sequence in which processes are carried out. Each process is given a priority value based on specific criteria, and the procedure with the highest priority is carried out first. In this article, we will be discussing Non-Preemptive Priority, the much-needed Process of Prioritization with some examples, and some strategies to prevent starvation in terms of Non-Preemptive Priority. What is Non-Preemptive Priority? A process in non-preemptive priority scheduling keeps running until it is finished or voluntarily enters a waiting state. A higher-priority process is not halted by the scheduler ... Read More

8K+ Views
Introduction Named pipes, also referred to as FIFOs (First In, First Out), constitute essential IPC systems in software systems. They offer a quick and effective method for successfully transferring information between processes. Specialized kinds of files known as named pipes serve as a means for interaction among unconnected procedures that operate on an identical structure as well as on separate ones. First-in, first-out (FIFO) named pipes ensure that information composed to the line by a single procedure is read from the pipe by another course in the identical order. Therefore, They are particularly advantageous when processes must communicate independently without ... Read More

880 Views
Introduction A traditional approach to solving the critical section issue in programming simultaneously for both procedures is Peterson's algorithm. But since you said "N" processes, I presume you mean an altered Peterson's method that can manage over two procedures. Mutual exclusion is guaranteed by the initial Peterson's method for two distinct processes, yet it can't be immediately expanded to support N methods. Lamport's bakery algorithm, for example, is a deviation and an extra period of Peterson's algorithm which may be applied to N processes. The N process Peterson Algorithm Peterson's algorithm which can cope with N processes is called ... Read More

6K+ Views
Introduction To avoid information loss and discrepancies, it is essential to make certain that discussed assets are obtained in an organized way when using concurrent programming methods, in which numerous threads or methods operate simultaneously. Mutual exclusion, which ensures that just a single string or procedure has access to a crucial area or resource that everyone shares at any point in time, is how this is accomplished. In this article, we will be talking about Mutual Exclusion in Synchronization, its various techniques, use cases, and example implementation through Python. What is Mutual Exclusion in Synchronization? A key component of synchronizing ... Read More

9K+ Views
Introduction A key principle of distributed systems is mutual exclusion, which prevents simultaneous operations or node locations from concurrently using common assets or crucial areas. When various procedures attempt to gain access to an identical asset at once, disputes, racial conditions, and discrepancies may result. Due to the absence of storage and the possibility of connection interruptions, errors, and node-to-node difficulties with communication and mutual exclusion turns more difficult in distributed systems. For achieving mutual exclusion in distributed systems, many techniques and procedures were established. In this article, we will be exploring the two main approaches, the various types, ... Read More

12K+ Views
Introduction In multitasking programming, mutex locks, also referred to as mutual exclusion locks, are synchronization basic functions used to prevent simultaneous possession of resources that are shared by numerous threads or procedures. The word "mutex" means "mutual exclusion." In this article, we will be exploring the components, types with examples, use cases, and implemented examples for Mutex Locks. What are Mutex Locks? A mutex lock makes it possible to implement mutual exclusion by limiting the number of threads or processes that can simultaneously acquire the lock. A single thread or procedure has to first try to obtain the mutex ... Read More

3K+ Views
There are two methods for creating systems of computers with multiple processors or processor cores: multiprocessor organization and multicore organization. Both strategies aim to boost a computer's processing power by enabling it to handle several tasks at once. Several separate processors linked by a communication network make up a multiprocessor system in most cases. Each processor can carry out a unique set of instructions and has a separate local memory. The throughput of the entire system can be increased by these processors working on several tasks concurrently. In this article, we will explore Multiprocessor and Multicore Organization, their use cases, ... Read More

832 Views
Paging enables the operating system to deallocate and allocate memory as necessary without worrying about the memory's physical location. Operating systems employ paging as a memory management strategy to efficiently use the memory resources at their disposal. It makes it possible for the operating system to divide memory into discrete, compact fixed-size "pages, " which are then utilized to store information and code. The ability to let programs use more memory than is actually available is one of the key justifications for employing paging. This is made feasible by the operating system's ability to swap out unwanted memory pages ... Read More