
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Diksha Patro has Published 123 Articles

Diksha Patro
3K+ Views
An operating system (OS) is a piece of software that controls and manages the hardware and software resources of a computer while also giving users a simple way to interact with the system. By serving as a conduit between the user and the computer hardware, it makes it easier for ... Read More

Diksha Patro
4K+ Views
Operating systems use the Not Recently Used (NRU) page replacement algorithm as a fundamental page replacement tactic to control memory. Its major goal is to locate and remove pages from memory that haven't been accessed in a while. In this article, we will be discussing the NRU page replacement algorithm, ... Read More

Diksha Patro
1K+ Views
Operating systems assign memory to processes using the memory management strategy known as non-contiguous allocation. This method divides memory into fixed-size blocks or partitions, and each partition can be assigned to a process according to its needs in terms of size. The non-contiguous allocation permits a process's memory to be ... Read More

Diksha Patro
744 Views
Operating systems use the scheduling algorithm non-preemptive priority scheduling to choose the sequence in which processes are carried out. Each process is given a priority value based on specific criteria, and the procedure with the highest priority is carried out first. In this article, we will be discussing Non-Preemptive Priority, ... Read More

Diksha Patro
8K+ Views
Introduction Named pipes, also referred to as FIFOs (First In, First Out), constitute essential IPC systems in software systems. They offer a quick and effective method for successfully transferring information between processes. Specialized kinds of files known as named pipes serve as a means for interaction among unconnected procedures that ... Read More

Diksha Patro
1K+ Views
Introduction The disc scheduling method N-Step-SCAN (also called N-Step-LOOK) determines the sequence whereby disc requests for input/output are handled. It is a development for the SCAN (Elevator) method, which functions by moving the disc arm in a particular direction and responding to demands there as long as it receives no ... Read More

Diksha Patro
880 Views
Introduction A traditional approach to solving the critical section issue in programming simultaneously for both procedures is Peterson's algorithm. But since you said "N" processes, I presume you mean an altered Peterson's method that can manage over two procedures. Mutual exclusion is guaranteed by the initial Peterson's method for two ... Read More

Diksha Patro
6K+ Views
Introduction To avoid information loss and discrepancies, it is essential to make certain that discussed assets are obtained in an organized way when using concurrent programming methods, in which numerous threads or methods operate simultaneously. Mutual exclusion, which ensures that just a single string or procedure has access to a ... Read More

Diksha Patro
9K+ Views
Introduction A key principle of distributed systems is mutual exclusion, which prevents simultaneous operations or node locations from concurrently using common assets or crucial areas. When various procedures attempt to gain access to an identical asset at once, disputes, racial conditions, and discrepancies may result. Due to the absence ... Read More

Diksha Patro
12K+ Views
Introduction In multitasking programming, mutex locks, also referred to as mutual exclusion locks, are synchronization basic functions used to prevent simultaneous possession of resources that are shared by numerous threads or procedures. The word "mutex" means "mutual exclusion." In this article, we will be exploring the components, types with examples, ... Read More