Solved

Operating Systems Environment

Posted on 2011-03-04
5
479 Views
Last Modified: 2012-08-13
I'm doing a self study on my own and have gotten stuck on this question. Can any expert here help me out?

For the two systems described below, given that all of the devices are of the same. please help me answer these questions if you can:

a)      Determine the remaining needs for each job in each system.
b)      Determine whether each of the systems is safe or unsafe.

System A
System A has 12 devices; only 1 is available.

Job #      Devices Allocated      Maximum Required      Remaining needs
1            5                  6
2            4                  7
3            2                  6
4            0                  2

System B
System B has 14 devices; only 2 are available.

Job #      Devices Allocated      Maximum Required      Remaining needs
1            5                  8
2            3                  9
3            4                  8
0
Comment
Question by:fghabin
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
5 Comments
 
LVL 79

Expert Comment

by:arnold
ID: 35042031
System A is safe.
System B is unsafe.

safety is determined by having a way to complete all jobs.
0
 

Author Comment

by:fghabin
ID: 35042084
IThanks for your response Arnold. I'm very new to this. how do you complete all jobs and whats the formula calculate/determine the remaining needs?
0
 
LVL 79

Accepted Solution

by:
arnold earned 500 total points
ID: 35043485
You have a job and the number of resources it was already allocated and the maximum number of resources it needs. Once the job is done, the resources of the job are released.

Lets say you were asked to build a shelf. You have been given a saw, and need a hammer.
Job:                           Allocated resources                              Maximum
Build shelf                          1                                                     2

Once you are given a hammer you can complete the task of building a sheld at the end of which a saw and hammer will become available for other tasks.
0
 

Author Comment

by:fghabin
ID: 35044905
Thanks Arnold, it makes more sense now and I think I get it now. So I created the question below to test my knowledge.
System A
The following system (X) has 15 devices and only 1 is available.
Job #      Devices allocated   Max. required
1                   5                               14
2                   7                               10
3                   2                                 3

System B
The following system (Y) has 19 devices and only 1 is available.
Job #      Devices allocated    Max. required
1                  10                              18
2                   3                               10
3                   5                                 6

So I think both System A and System B are UNSAFE. Do you agree?
0
 

Author Comment

by:fghabin
ID: 35045075
After reviewing this again, I think System A is safe and System B in unsafe
0

Featured Post

[Live Webinar] The Cloud Skills Gap

As Cloud technologies come of age, business leaders grapple with the impact it has on their team's skills and the gap associated with the use of a cloud platform.

Join experts from 451 Research and Concerto Cloud Services on July 27th where we will examine fact and fiction.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Just about everyone has an old PC laying around.  Ask anyone in the IT industry, whether they are a professional or play in it as a hobby.  From outdated Desktops to cheap "throwaway" laptops, they are all around and not as hard to "fix up" as you m…
Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…
Hi friends,  in this video  I'll show you how new windows 10 user can learn the using of windows 10. Thank you.
Suggested Courses

634 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question