Hi, This question may sound stupid. But I want to know that
if the secondary storage device is used to store data on
computer, then what is the use of the primary storage in the
first place? Why cant we use only one?
Answers were Sorted based on User's Feedback
Answer / sandeep
time taken to access primary memory(RAM) is faster than to
access secondary storage memory which influences ur
processor speed/throughput.
primary memory is like scratchpad where data related to
currently executing programs is stored, rest is stored in
secondary storage device, accessed only when required.
| Is This Answer Correct ? | 3 Yes | 0 No |
Answer / saket kale
The speed difference between the CPU and secondary storage
is too high, so if secondary storage is treated as the
primary one then the overall speed will slow down
considerably, basically primary storage is used to increase
speed and provide instant output.
| Is This Answer Correct ? | 2 Yes | 0 No |
Dear All, When the patches are installed in the server OS, how will we know that which patch is the latest patch?
Can I restore my computer to yesterday?
Does a disk cleanup delete everything?
What is a Safe State and what is its use in deadlock avoidance?
In the token-passing mutual exclusion algorithm, is the timestamping used to reset clocks and correct drifts, as in the distributed queue algorithms? if not, what is the function of the timestamping?
How To Enable & Disable Quorum?
Is chrome os better than windows 10?
Is gnu an os?
Q1. What is an interrupt? How are multiple interrupts dealt with? Q2. Explain the difference between a MONOLITHIC KERNAL and a MICROKERNAL? Q3. List reasons why a Mode switch between threads may be cheaper than a Mode switch between processes. Q4. What is the difference among deadlock avoidance, detection and prevention? Q5. What items of information about a task might be useful in real time scheduling? Q6. Discuss some of the reasons for implementing process migration ? How is the process address space handled during process migration?
Explain about memory management in operating system.
0 Answers Aditi Placement Service,
Assuming one link of the Trojan horse copy-and-observe-later chain is broken. There are two other possible angles of attack by Alice: Alice logging on and attempting to read the string directly, and alice assigning a security level of sensitive to the back-pocket file. Does the reference monitor prevent these attacks?
Why is android better than ios?