The IBM system/370 architecture uses a two-level memory structure and refers to the two levels as segments and pages, although the segmentation approach lacks many of the features described in Chapter 8. For the basic 370 architecture, the page size may be either 2 KB or 4 KB, and the segment size is fixed at either 64 KB or 1 MB. For the 370/XA and 370/ESA architectures, the page size is 4 KB and the segment size is 1 MB. What advantages of segmentation does this scheme lack

Answers

Answer 1

Answer:

Explanation:

Introductory thought:  

Thinking about the architecture for the IBM System/370 that is fit for giving higher preparing force and more stockpiling limit since it utilizes two-level of memory structure which is known as the segments and caches and the given plan is as per the following:  

In division the address space is isolated into quantities of segments of variable sizes and then again in paging the address space is partitioned into quantities of fixed-sized units that are known as pages.It is more helpful for better utilization of memory. The fundamental architecture for the IBM system/370 architecture the size of the page are for the most part either 2KiloBytes (KB) or 4KB and the size of the segments will be changed from 64KiloBytes to 1MegaBytes.   The two dissimilar kinds of architecture that existed are 370/XA that is the Extended Architecture, also the other is 370/ESA known as the Enterprise Systems Architecture.    The page size is 4KB for the Extended variant and 1MB for the Enterprise Systems Architecture (ESA).

Advantages of segmentation that the given scheme needs to incorporate includes:

In the configuration of the architecture for IBM System/370 the segments are of a fixed size which isn't noticeable for the programmer and as such he will know the interior subtleties and subsequently inside architecture is stowed away from outside gentle.  In IBM system/370 the reference bit is zero for the processor hardware as well as at whatever point another page is stacked into the edge, the reference bit is changed to one after referring to a specific area inside the casing.  The quantity of lines of the page outline table is overseen by the Operating System and a page outline table section is moved to start with one line then onto the next depending on the length of the span of the referenced bit from the page outline which is sets to nothing. Whenever there is a need to supplant the page then the page browsed the line of the longest life non referenced edges.

Related Questions

Why do we need operating systems?

Answers

NO NOSE PORQIE JExplanation:

What is
Computer Security

Answers

Answer:

Computer Security is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.

Explanation:

Answer:

the protection of computer systems and information from theft

Explanation:

suppose as a head software engineer you assign the job of creating a class to a subordinate. You want to specify thirty-eight different methods in which you are willing to detail the parameters each is to receive as well as what each returns. You, however, do not have the time to create the details of each method and wish to assign that work to the subordinate. What would be your best approach to ensure that the subordinate finishes the assigned job.

Answers

Answer:

jskjsjsjsjskdmsnjsnsnsns

The place where an organism lives and that provides the things the organism needs is called it’s

Answers

Answer:

A habitat is a place where an organism makes its home. A habitat meets all the environmental conditions an organism needs to survive.

Explanation:

state and explain application areas where computer are applied​

Answers

Answer:

There are at least five areas that are covered by computer applications, and five of those are business, government, military, manufacturing, and music. There are also other areas such as scientific and the role of technology in our society is growing annually.

Computers have now for several decades brought automation to the table in small, medium, and large businesses. There are word processing and spreadsheet applications for small businesses all the way up to enterprise-wide applications that cover every aspect of a large business such as accounting, inventory, shop floor, management, and feature real-time reporting capability that can give a snapshot glimpse of the financial position of a company at any point in time.

The government has a wide variety of computer applications. Government uses many of the same tools as small to large businesses in desktop type applications and many that are much more advanced that are used in the military.  Manufacturing applications involve computer-aided design and applications that are used to track production from the time a raw material is moved into the warehouse all the way to the production floor and back into the warehouse as a finished good.  

Military only applications include systems that use GPS in missiles to hone in on targets from miles away. There are all kinds of other applications some of which are secret in nature and the public does not become aware of these until a war is underway. Computer applications in music can help to transcribe and compose music as well as provide accompaniment for a musician to practice with.  

Expect the number of computer applications in all of these fields to become more common in the future. Expect many applications to take the place of people to save money in a cash-crunched economy where everyone is looking for more ways to save money and cut costs.

Explanation:

how does dual concepts work?​

Answers

The transaction that affects a business

My goal is to help Edmentum kids
Select the correct answer.
What type of communication flow occurs in a formal network when employees submit status reports to their superiors?
A.
downward communication
B.
horizontal communication
C.
lateral communication
D.
upward communication
Hopefully people will answer these

Answers

Answer:

D upward communication

Answer:

D.

upward communication

Explanation:

how does abstraction help us write programs

Answers

Answer:

Abstraction refines concepts to their core values, stripping away ideas to the fundamentals of the abstract idea. It leaves the common details of an idea. Abstractions make it easier to understand code because it concentrates on core features/actions and not on the small details.

This is only to be used for studying purposes.

Hope it helps!

You are given a 5-letter word (for example, abcde). Write a C-Program which outputs all possible unique 5 letter permutations of this word in a text file. There should be no repetition of letters in permutation (i.e. in our example, bacde is a valid permutation but bbcde is invalid. Use of library functions for generation of permutations is NOT allowed.
The text file containing the output should be named as q3out.txt. Each word of the output must be on a separate line in the text file. The 5-letter input word should be read by your program from the console. Provide comments in your code. Submit your C code, and the q3out.txt file for the following inputs:
(a) parba
(b) arbca

Answers

Answer:

See attachment 1 for code

See attachment 2 for the output of permuting letters of parba

See attachment 3 for the output of permuting letters of arbca

Explanation:

The program was implemented in C

The program uses a recursive function letterpermutation and a swap function to successfully implement the requirement of this question.

The letterpermutation function is defined here

void letterpermutation(char *mystring, int index1, int index2) {  

This lets the program writes to a file

  FILE *fptr;

This opens the file in an appending mode

  fptr = fopen("q3out.txt","a");

int i;

This checks for unique strings.

if (index1 == index2) {

If found, this appends the string to the text file

   fprintf(fptr,"%s\n",mystring); }

If otherwise

else{  

This iterates through the string

for (i = index1; i <= index2; i++)   {

The swap function is called to swap the characters of the string

 swap((mystring+index1), (mystring+i));  

This calls the function, recursively

letterpermutation(mystring, index1+1, index2);  

This further swaps the characters of the string

swap((mystring+index1), (mystring+i));  

} } }  

The swap function begins here and what it literally does is that it swaps characters of the input string to create a new string

void swap(char *ch1, char *ch2) {  

char temp;  

temp = *ch1;  *ch1 = *ch2;  *ch2 = temp; }

The main function begins here

int main() {  

This declares and initializes the string

char mystring[] = "ABCd"; // The string here can be changed

This calls the function to permute the string

letterpermutation(mystring, 0, strlen(mystring)-1);  

return 0; }

A tactful representation of opposing views is essential when writing for the opposition. True or false

Answers

say that is it true i know

You have a limited budget and you need to type color documents frequently, which type of printers would you buy?​

Answers

Answer:

you can use these printer if you have this amount of budget

Explanation:

explain 3 components of the Visual Basic IDE (6 marks)​

Answers

Answer:

Explanation:

The IDE of Visual Studio 2008 contains numerous components, and it will take you a while to explore them. It’s practically impossible to explain in a single chapter what each tool, window, and menu command does. We’ll discuss specific tools as we go along and as the topics get more and more advanced. In this section, I will go through the basic items of the IDE — the ones we’ll use in the following few chapters to build simple Windows applications.

The IDE of Visual Studio 2008 contains numerous components, and it will take you a while to explore them. It’s practically impossible to explain in a single chapter what each tool, window, and menu command does. We’ll discuss specific tools as we go along and as the topics get more and more advanced. In this section, I will go through the basic items of the IDE — the ones we’ll use in the following few chapters to build simple Windows applications.The IDE of Visual Studio 2008 contains numerous components, and it will take you a while to explore them. It’s practically impossible to explain in a single chapter what each tool, window, and menu command does. We’ll discuss specific tools as we go along and as the topics get more and more advanced. In this section, I will go through the basic items of the IDE — the ones we’ll use in the following few chapters to build simple Windows applications.

The Edit menu contains the usual editing commands. Among these commands are the Advanced command and the IntelliSense command. Both commands lead to submenus, which are discussed next. Note that these two items are visible only when you’re editing your code, and are invisible while you’re designing a form.

What type of role does the group leader have? Informal negative positive Formal

Answers

Just as leaders have been long studied as a part of group communication research, so too have group member roles. Group roles are more dynamic than leadership roles in that a role can be formal or informal and played by more than one group member

Which of the following terms is associated with instant messaging?
A. buddy list
B.subject heading
C.Save As
D.texting

Answers

D.

Texting is associated with instant messaging

Answer: A buddy list is a term that is associated with instant messaging (IM)

Have a wonderful day :D

Explanation:

A slide titled Alexander Graham Bell. There are 6 bulleted entries on the slide, and there is a lot of text on the slide. There is very little space around the text to the edges of the slide. There is no image on the slide and the text is shaded white on a blue background.
This slide has several design problems, according to the design principles that were just reviewed. What are the problems? Check all that apply.

The slide contains too much text.
The slide does not have an image or visual aid.
The text is too small.
The background makes it hard to read the text.
The slide does not have enough empty space.

Answers

Answer:

The following are design problems associated with the Alexander Graham Bell slide:

The slide contains too much text.

The slide does not have an image or visual aid.

The background makes it hard to read the text.

The slide does not have enough empty space.

Explanation:

Answer:

It's not ABDE, it's ABE

Explanation:

i tried it

A(n) _____ is a legal right of ownership of intellectual property.

end-user license

agreement

free and software license

proprietary software license

copyright

Answers

Answer:

copyright

Explanation:

Copyright protects intellectual property. If you own a copyright, you own the legal rights to said property.

Answer:copyright

Explanation:

On a roulette wheel, the pockets are numbered from 0 to 36. The colors of the pockets are as follows: Pocket 0 is green. For pockets 1 through 10, the odd-numbered pockets are red and the even-numbered pockets are black. For pockets 11 through 18, the odd-numbered pockets are black and the even-numbered pockets are red. For pockets 19 through 28, the odd-numbered pockets are red and the even-numbered pockets are black. For pockets 29 through 36, the odd-numbered pockets are black and the even-numbered pockets are red. Write a program that asks the user to enter a pocket number and displays whether the pocket is green, red, or black. The program should display an error message if the user enters a number that is outside the range of 0 through 36.

Answers

Answer:

pkt = int(input("Pocket Number: "))

if pkt == 0:

   print("Green")

elif pkt >= 1 and pkt <=10:

   if pkt%2 == 0:

       print("Black")

   else:

       print("Red")

elif pkt >= 11 and pkt <=18:

   if pkt%2 == 0:

       print("Red")

   else:

       print("Black")

elif pkt >= 19 and pkt <=28:

   if pkt%2 == 0:

       print("Black")

   else:

       print("Red")

elif pkt >= 29 and pkt <=36:

   if pkt%2 == 0:

       print("Red")

   else:

       print("Black")

else:

   print("Error")

Explanation:

The program was written in Python and the line by line explanation is as follows;

This prompts user for pocket number

pkt = int(input("Pocket Number: "))

This prints green if the pocket number is 0

if pkt == 0:

   print("Green")

If pocket number is between 1 and 10 (inclusive)

elif pkt >= 1 and pkt <=10:

This prints black if packet number is even

   if pkt%2 == 0:

       print("Black")

Prints red, if otherwise

   else:

       print("Red")

If pocket number is between 11 and 18 (inclusive)

elif pkt >= 11 and pkt <=18:

This prints red if packet number is even

   if pkt%2 == 0:

       print("Red")

Prints black, if otherwise

   else:

       print("Black")

If pocket number is between 19 and 28 (inclusive)

elif pkt >= 19 and pkt <=28:

This prints black if packet number is even

   if pkt%2 == 0:

       print("Black")

Prints red, if otherwise

   else:

       print("Red")

If pocket number is between 29 and 36 (inclusive)

elif pkt >= 29 and pkt <=36:

This prints red if packet number is even

   if pkt%2 == 0:

       print("Red")

Prints black, if otherwise

   else:

       print("Black")

Prints error if input is out of range

else:

   print("Error")

Which three major objects are built into the JavaScript language?
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A

Document, Object, Model.
B

Canvas, Geolocation and Drag.
C

None, JavaScript is object-based not object-oriented.
D

Document, Navigator, Array.

Answers

Answer:

jddjjddjdjdjjsjsjejejejjejejejjdjdjeje

Pretty sure, the answer is: None, JavaScript is object-based not object-oriented.

Use the drop-down menus to complete the statements about the recall option in Outlook 2016.

Recalling a message stops its delivery before the recipient
it.

It only works about half the time, and it only works when recipients are in the same
.

Once it is recalled, the
will get a message informing them of the recalled message.

Be sure to check your message before you send it, and assume it will be read within 30
of sending the message.

Answers

Just put your username

Answer:

Recalling a message stops its delivery before the recipient  

opens it.

It only works about half the time, and it only works when recipients are in the same organization

.

Once it is recalled, the recipient will get a message informing them of the recalled message.

Be sure to check your message before you send it, and assume it will be read within 30 seconds of sending the message.

Explanation:


Blocks that allows you to repeat scripts multiple times are

Answers

Answer:

here are several methods to make a script perform an action for a set amount of ... Technically, this may not work if you have wait blocks or other blocks that take up time. ... This script uses the timer and the Repeat Until block.

Explanation:

A Products table and an Orders table have several linked records that are joined by a cross-referencing table named ProductsOrders. What kind of table relationship do these tables demonstrate?
A.one-to-one
B.one-to-many
C.many-to-many
D.many-to-none

Answers

Answer:

I believe it could be D. many to many.

Answer:

C. Many-to-Many

Explanation:

:)

Harry wants to change the background of all of his presentation slides. Which slide will enable him to make this change to all the slides at once?
Harry needs to change the ___________ to change the background of all his presentation slides.

Answers

Answer:

settings

Explanation:

edmentum

Why is myConcerto considered essential to Accenture's work with enterprise
systems?

Answers

Answer:

myConcerto can help clients envision, innovate, solution, deliver and support their transformation to an intelligent enterprise–providing the technology foundation to accelerate their journey and minimize risk along the way.

Hope it helps

Please mark me as the brainliest

Thank you

myConcerto is considered essential to the Accenture enterprise because it helps to do the following:

It can help the clients to envision more.It is useful for innovation.It provides solution.It helps to deliver and also support transformation to enterprises that make use of artificial intelligence.

What is myConcerto?

This platform is one that is digitally integrated. What it does is that it helps Accenture in the creation of great business outcomes.

Read more on Accenture here:

https://brainly.com/question/25682883

What is the second step in opening the case of working computer

Answers

Answer: 1. The steps of opening the case of a working computer as follows:

2. power off the device.

3. unplug its power cable.

4. detach all the external attachments and cables from the case.

5. Remove the retaining screws of the side panel.

6. Remove the case's side panel.

Explanation:

true or false with reason :- carriage inword is carriage on purchases​

Answers

Answer:

True

Explanation:

Carriage on purchases is carriage inward. Explanation: Carriage inwards refers to the transportation costs required to be paid by the purchaser when it receives merchandise it ordered with terms FOB shipping point. Carriage inwards is also known as freight-in or transportation-in.

:)

What is Typing?
And
What is Economic? ​

Answers

Answer:

what is typing: the action or skill of writing something by means a typewriter or computer

what is economic:a branch of knowledge concerned with production,consumption,and transfer of wealth.

You have a certificate that you want to convert into digital form, what kind of device would you use? *
نقطتان (2)
Printer
Barcode scanner
Scanner
Plotter​

Answers

Answer:

Scanner.

Explanation:

In this scenario, you have a certificate that you want to convert into digital form, the kind of device you would use is a scanner.

When scanners and digital cameras are used to capture images that are uncompressed or minimally processed image file, it is known as a RAW image file.

Generally, this file type are usually very large in size because of their lossless quality and does not have any alteration and as such have not been processed; thus, cannot be printed

why is GDS important to travel industry?

Answers

Answer:

A Global Distribution System (GDS) is a wonderful tool that properties should use to reach customers easily. This is a central reservation system that allows travel agents to access hotel rates and availability as well as prices for flights, trains and rental car companies in real time.

C++ "Simon Says" is a memory game where "Simon" outputs a sequence of 10 characters (R, G, B, Y) and the user must repeat the sequence. Create a for loop that compares the two strings starting from index 0. For each match, add one point to userScore. Upon a mismatch, exit the loop using a break statement. Assume simonPattern and userPattern are always the same length.
Ex: The following patterns yield a userScore of 4:
Ex: The following patterns yield a userScore of 9:
simonPattern: RRGBRYYBGY
userPattern: RRGBBRYBGY
Result: Can't get test 2 to occur when userScore is 9
Testing: RRGBRYYBGY/RRGBBRYBGY
Your value: 4
Testing: RRRRRRRRRR/RRRRRRRRRY
Expected value: 9
Your value: 4
Tests aborted.

Answers

Answer:

In C++:

#include <iostream>

using namespace std;

int main(){

   int userScore = 0;

   string simonPattern, userPattern;

   cout<<"Simon Pattern: ";    cin>>simonPattern;

   cout<<"User Pattern: ";    cin>>userPattern;

   for (int i =0; i < simonPattern.length();i++){

       if(simonPattern[i]== userPattern[i]){

           userScore++;        }

       else{            break;        }

   }

   cout<<"Your value: "<<userScore;

   return 0;

}

Explanation:

This initializes user score to 0

   int userScore = 0;

This declares simonPattern and userPattern as string

   string simonPattern, userPattern;

This gets input for simonPattern

   cout<<"Simon Pattern: ";    cin>>simonPattern;

This gets input for userPattern

   cout<<"User Pattern: ";    cin>>userPattern;

This iterates through each string

   for (int i =0; i < simonPattern.length();i++){

This checks for matching characters

       if(simonPattern[i]== userPattern[i]){

           userScore++;        }

This breaks the loop, if the characters mismatch

       else{            break;        }

   }

This prints the number of consecutive matches

   cout<<"Your value: "<<userScore;

what precautions should be taken to make a computer more secure ​

Answers

Answer:

To make a computer more secure

Explanation:

we have following ways :

1)we should have anti virus to protect our computer.

2)we should not play or look computer for a long time because it destroy our files

Other Questions
1. Consider the following:You are the CEO of a company that sells a line of hair products made with natural and organic ingredients from South America. The product is manufactured in Brazil and is imported to the United States for sale. Thecompany has been successful in the U.S. market and you are considering expanding to the European market. Greece is the first country to which you would like to export. However, you must do some research on thesocio-cultural factors that will affect your decision.2. Answer the following questions (you may use the Internet for research purposes): What are some of the legal and political factors that you will consider? Are there any economic barriers that you might encounter? After doing your research, what recommendations would you make regarding the expansion to the European market? Are there any cultural differences between the United States and Greece? How will these differences affect the way you do business there?. Would expanding to Greece be a good business decision? Why or why not? difference between animal cells and plants cells What is the object that Romeo looks through to see her for the first time? Why does Bedford consider returning in a bigger sphere with guns? He wants to drive out the Selenites. He wants to return for gold. He wants to explore the cave again. He wants to get revenge. marco set aside 50 minutes hey, i'm trying to get a phone 8 but i don't have enough money. i'm trying to figure out how long it'll take me to get it. if you can tell me how long it'll take ill give you brainliest :) i need $177, i'm getting an allowance of $5 a week after march 5. i have $16 rn. 25 + 12x (24 + 3) - 15 21.3 Il n'en aurait pas parle s'il ne s'en (answer goes here) passouviendrasouviendraitsouvenaitsouvient What is the greatest common factor of 50, 30, and 46? 6.3.12The coordinates of point T are (0,5). The midpoint of ST is (2,-2). Find the coordinates of point S.The other endpoint is(Type an ordered pair.) Which of the following is a true polynomial identity? a) a^6+b^6 = (a^2 + b^2)(a^4 + a^2b^2 + b^4)b) a^6 - b^6 = (a^2+b^2)(a-ab+b)(a+ab + b)c) a^6 - b^6 = (a-b)(a-ab+b)(a+ab+b)d) a^6 - b^6 = (a-b)(a-ab+b^2)(a^2+ab+b^2) 10 points and choose 3 lines of what it is and please be right HELP FAST The temperature in the morning was -4 F. At night the temperature dropped to -12.8 F. How can the temperature drop from the morning to the night be represented? A. 16.8 LB. 8.4 F C. -8.8 F D. -16.8 F The sum of 7 and twice a number is 4. Write an equation. Which statement explains how you could use coordinate geometry to prove that quadrilateral ABCD is a rectangle f(x) = 5 0.2c and g(x) = 0.2(x + 5). You are given a 5-letter word (for example, abcde). Write a C-Program which outputs all possible unique 5 letter permutations of this word in a text file. There should be no repetition of letters in permutation (i.e. in our example, bacde is a valid permutation but bbcde is invalid. Use of library functions for generation of permutations is NOT allowed. The text file containing the output should be named as q3out.txt. Each word of the output must be on a separate line in the text file. The 5-letter input word should be read by your program from the console. Provide comments in your code. Submit your C code, and the q3out.txt file for the following inputs: (a) parba (b) arbca When adding and subtracting fractions, what MUST be the same before you even begin to add or subtract?NumeratorsDenominatorsFractionsWhole Numbers Which polynomial represents the sum below? (4x5 + 6x3 + 3) + (3x3 + x + 9) The man which came here is my uncle .Why is which inappropriate for the above question