Diksha Patro

Diksha Patro

99 Articles Published

Articles by Diksha Patro

Page 2 of 10

mindepth and maxdepth in Linux find() command for limiting search to a specific directory

Diksha Patro
Diksha Patro
Updated on 26-Jul-2023 5K+ Views

The find command in Linux is used to look for files and directories inside a directory structure. The find command's min depth and max depth arguments let you restrict the search to a certain directory or depth level. Max depth defines the maximum depth level up to which the search should be conducted, whereas min depth specifies the least depth level from the starting directory where the search should begin. These choices can help you focus your search to a certain directory or depth level within a complicated directory structure. What are min depth and max depth levels? max depth ...

Read More

Mimic the Linux adduser command in C

Diksha Patro
Diksha Patro
Updated on 25-Jul-2023 418 Views

The add user command in Linux is used to add new user accounts on operating systems that resemble Unix. It is frequently used by system administrators to add new users with predetermined usernames, passwords, and other user-related information System calls Software can communicate with the kernel of the operating system, which manages system resources and provides services to user-level programs, through system calls. System calls are used in C programming to gain access to the features and services provided by the operating system, including file I/O, process management, network connectivity, and more. To interact with the operating system, C programmers ...

Read More

Microsoft Windows (10) Vs macOS (Mojave)

Diksha Patro
Diksha Patro
Updated on 25-Jul-2023 338 Views

Introduction Microsoft Windows 10 has become the most recent version available for Microsoft Corporation's prevalent platform. It became available in the year 2015 and has since grown into one of the most popular laptop operating systems. The latest version of Windows has an adaptable user experience, sophisticated safety features, and broad integration with a wide range of both hardware and software machines. Mac OS X Mojave, on the opposing conjunction, is the most recent update to Apple Inc.'s OS. It came out in the year 2018 as well as is accessible only on devices made by Apple. Mojave, the latest ...

Read More

Methods to clean temporary files from Ubuntu

Diksha Patro
Diksha Patro
Updated on 25-Jul-2023 2K+ Views

Introduction Temporary documents are data produced by calculating for storing details whereas another operation is being carried out performed. These short-term documents may build up over time and consume valuable disc space. Ubuntu is an established Linux-based operating system that includes a number of methods for cleaning temporary data and optimizing disc space The most common techniques for cleaning temporary data in Ubuntu involve employing the terminal's "clean" and "auto-remove" instructions, employing builtin tasks such as Ubuntu Janitor, and utilizing third-party programs such as Bleach Bit. These are among the simple and effective strategies for freeing up disc space and ...

Read More

Methods in Interprocess Communication

Diksha Patro
Diksha Patro
Updated on 25-Jul-2023 4K+ Views

Introduction Inter process communication (IPC) was the transfer of information and interaction between multiple processes in an electronic system. Every operation in a tasking process structure runs on its own, as well as communication between them is required if these processes require to exchange of information or coordination of what they are doing IPC is an essential part of contemporary operating systems and can be employed in a variety of applications, which include simple control-line appliances to complicated systems with distributed components. The primary goal of IPC is to make the transmission of knowledge among processes more private and effective. ...

Read More

Message-based Communication in IPC(inter-process communication)

Diksha Patro
Diksha Patro
Updated on 25-Jul-2023 1K+ Views

Introduction Message-based communication (MBC) is a type of communication within a process (IPC) in which multiple procedures share data by sending statements to the other person. The transmission procedure structures an e-mail that included what needs to be passed on and provides it to the process of reception in this form of interpersonal interaction. In turn, the procedure for receiving gets the communication and herbal extracts whatever data is required. Utilizing memo-based interactions in IPC has multiple benefits. One of the primary benefits is that it offers a simple and adaptable way to facilitate interaction between procedures. Asynchronous programming message ...

Read More

Message Passing in Java

Diksha Patro
Diksha Patro
Updated on 25-Jul-2023 2K+ Views

Introduction Message passing, a method of transferring communications among items or threads, is an essential idea in distributed systems and parallel programming. The transmission of messages in Java may be accomplished with an assortment of methods and structures, based on the implementation's particular needs Using the power source java.util.concurrent the container, which offers an array of interfaces and class libraries for establishing and handling threads that are active locks, and synchronization mechanisms, is a single method for implementing passing messages in Java, for instance. An Executor interface, for instance, is able to be utilized without delay to carry out duties, ...

Read More

Memory Protection in Operating Systems

Diksha Patro
Diksha Patro
Updated on 25-Jul-2023 5K+ Views

Memory protection is a crucial component of operating systems which permits them to avert one method's storage from being utilized by another. Memory safeguarding is vital in contemporary operating systems since it enables various programs to run in tandem lacking tampering with their respective storage space The primary goal of safeguarding memory is to avert an application from accessing RAM without permission. Whenever an approach attempts to use memory that it does not have permission to enter, the computer's operating system will stop and end the process. This hinders the program from obtaining memory that it should not. Memory backup ...

Read More

Look aside Buffer

Diksha Patro
Diksha Patro
Updated on 25-Jul-2023 865 Views

What is a Look Aside Buffer? A Look-aside Buffer (LAB) is a type of cache memory that is used in computer systems to store frequently accessed data. The LAB is located between the CPU and the main memory, and it acts as a high-speed buffer to improve system performance. The LAB works by caching a portion of the data from the main memory that is frequently accessed by the CPU. When the CPU requests data from the main memory, the LAB first checks if the data is present in the buffer. If the data is found in the LAB, it ...

Read More

Longest Remaining Time First (LRTF) CPU Scheduling Program

Diksha Patro
Diksha Patro
Updated on 25-Jul-2023 952 Views

The Longest Remaining Time First (LRTF) scheduling algorithm is a variant of the Longest Job First (LJF) algorithm and is used by the operating system to schedule incoming processes. In LRTF, the process with the highest remaining execution time is given the highest priority and scheduled to be executed first. Algorithm Create a structure of process containing all necessary fields like AT (Arrival Time), BT(Burst Time), CT(Completion Time), TAT(Turn Around Time), and WT(Waiting Time). Sort the processes according to their Arrival Time (AT). Find the process with the largest Burst Time (BT) and execute it for one unit of ...

Read More
Showing 11–20 of 99 articles
« Prev 1 2 3 4 5 10 Next »
Advertisements