<<영어 해석>> 좀 부탁드려요~~ 급합니다!!내공 있어요~~!!
-
게시물 수정 , 삭제는 로그인 필요
좀 많은데요...해석 좀 부탁드려요~~
하실 수 있는데 까지만이라두....급하거든요...꼭 좀 부탁드립니다.
1. Control data and its access, provide for efficient device access, coordinate the use of the machine's resources, and control access to the machine.
2. Batch processing refers to the process of collecting a program (or programs) together with data and submitting this material to the operating system for execution (perhaps at a later time) without further intervention by the user.
Interactive processing refers to the technique of executing a program in a manner that allows the user to communicate with the program during its execution.
3. Interactive processing allows the user to communicate with a program during its execution. The phrase "real-time processing" means that the time required for the activities of the program being executed must coordinate with activities in the outside world.
4. An operating system that allows several activities to execute "at the same time."
5. The status of each process (ready, waiting) and the priority of each process.
6. A process that is ready could make progress if given a time slice, but giving a time slice to a process that is waiting would merely waste time since it cannot progress until some event occurs.
7. Virtual memory is the memory space whose presence is merely simulated by swapping blocks of data back and forth between a disk and the memory actually present in the machine.
8. If both processes merely need to read from the file, no conflicts will occur. However, if one of the processes is going to modify the file, them it should have exclusive access. (Such problems are discussed in Section 9.5 in the context of databases.)
9. Load balancing refers to the task of keeping all the processors busy. Scaling has to do with dividing a task into subtasks that can be performed simultaneously.
10. The machine begins by executing a program, called the bootstrap, at a predetermined location in memory. This program directs the machine to load a program (the operating system) from mass storage into main memory. The original program tells the machine to transfer its attention to the program just loaded.
11. At least half. This does not include the time required to actually transfer the data. 25 milliseconds = 25000 microseconds. Thus, 25,000 instructions could be executed during this time.
12. Memory space, disk storage space, access to a printer, time slices, and access to files.
13. The I/O-bound process. This allows the controllers to start with the I/O activities. Then the compute-bound process can run while the other is waiting for these slower activities to take place. As a general rule of thumb, priority should be given to the slower activity.
14. A mix of I/O-bound and compute-bound processes will normally produce a higher throughput than a collection of processes with similar characteristics. For example, little is gained by allowing a collection of compute-bound processes to share time. In fact, such a collection will usually get done faster without the delays caused by switching repeatedly among the different processes in the collection. However, in the case of several I/O bound processes, it could be that the relative timing of the I/O requests would produce benefits in a time-sharing environment.
15. Save the current process' state;
select another process from the process table;
load that process' state;
start the next time slice.
16. A process’s state includes the values in the CPU’s registers (including the program counter) as well as the contents of its associated memory cells.
17. If a process asks for service from a mass storage device, its time-slice will be terminated because the process must wait for the device to perform the requested operation before continuing.
18. First: Interrupt signal occurs.
Second: Machine completes its current instruction.
Third: Machine saves the current program state.
Fourth: Machine begins executing the interrupt routine.
19. The client/server model is a context in which to envision communication between two processes. One process, called the client, makes requests of the other process, called the server. The server process fills the request and returns an appropriate response.
20. CORBA is a standard for communication between objects.
21. LANs and WANs.
22. kermit is the name of the receiver of the message; frogs.animals.com is the mnemonic name of the machine that handles kermit’s e-mail.
23. a. A name server is a process who’s task is to provide assistance in converting mnemonic names into IP addresses.
b. A domain is a part of an internet controlled by a single authority.
c. A router is a machine that connects two networks.
d. A host is a machine in a network.
24. The values 134, 48, 4, and 123 (base ten) are written 10000110, 110000, 100, and 1111011 in base two. Therefore the 32-bit address would be 8630047B in hexadecimal.
25. The internal details of an open network are public knowledge, which allows different organizations to produce compatible products. Such details of a closed network are proprietary, which restricts the ability of organizations to produce their own versions of the network’s components.
26. a. Hypertext is text in which items are linked to other texts in a manner that allows a reader to move between related material.
b. HTML (HyperText Markup Language) is a system for describing the structure of a hypertext document and identifying links between its components and other documents.
c. A browser is a program that presents hypertext documents to a reader .
27. The World Wide Web is the collection of hypertext documents available on the Internet.
28. HTTP is the protocol to be used when accessing the document; frogs.animals.com is the mnemonic name of the machine holding the document; animals/moviestars is the directory path to the document; and kermit.html is the name of the document.
29. A worm promulgates itself through a network; a virus attaches itself to a program.
30. There is no single answer. Possible answers deal with corruption of data, lack of control over access to data, and general vandalism.
좀 많은데요...해석 좀 부탁드려요~~
하실 수 있는데 까지만이라두....급하거든요...꼭 좀 부탁드립니다.
1. Control data and its access, provide for efficient device access, coordinate the use of the machine's resources, and control access to the machine.
2. Batch processing refers to the process of collecting a program (or programs) together with data and submitting this material to the operating system for execution (perhaps at a later time) without further intervention by the user.
Interactive processing refers to the technique of executing a program in a manner that allows the user to communicate with the program during its execution.
3. Interactive processing allows the user to communicate with a program during its execution. The phrase "real-time processing" means that the time required for the activities of the program being executed must coordinate with activities in the outside world.
4. An operating system that allows several activities to execute "at the same time."
5. The status of each process (ready, waiting) and the priority of each process.
6. A process that is ready could make progress if given a time slice, but giving a time slice to a process that is waiting would merely waste time since it cannot progress until some event occurs.
7. Virtual memory is the memory space whose presence is merely simulated by swapping blocks of data back and forth between a disk and the memory actually present in the machine.
8. If both processes merely need to read from the file, no conflicts will occur. However, if one of the processes is going to modify the file, them it should have exclusive access. (Such problems are discussed in Section 9.5 in the context of databases.)
9. Load balancing refers to the task of keeping all the processors busy. Scaling has to do with dividing a task into subtasks that can be performed simultaneously.
10. The machine begins by executing a program, called the bootstrap, at a predetermined location in memory. This program directs the machine to load a program (the operating system) from mass storage into main memory. The original program tells the machine to transfer its attention to the program just loaded.
11. At least half. This does not include the time required to actually transfer the data. 25 milliseconds = 25000 microseconds. Thus, 25,000 instructions could be executed during this time.
12. Memory space, disk storage space, access to a printer, time slices, and access to files.
13. The I/O-bound process. This allows the controllers to start with the I/O activities. Then the compute-bound process can run while the other is waiting for these slower activities to take place. As a general rule of thumb, priority should be given to the slower activity.
14. A mix of I/O-bound and compute-bound processes will normally produce a higher throughput than a collection of processes with similar characteristics. For example, little is gained by allowing a collection of compute-bound processes to share time. In fact, such a collection will usually get done faster without the delays caused by switching repeatedly among the different processes in the collection. However, in the case of several I/O bound processes, it could be that the relative timing of the I/O requests would produce benefits in a time-sharing environment.
15. Save the current process' state;
select another process from the process table;
load that process' state;
start the next time slice.
16. A process’s state includes the values in the CPU’s registers (including the program counter) as well as the contents of its associated memory cells.
17. If a process asks for service from a mass storage device, its time-slice will be terminated because the process must wait for the device to perform the requested operation before continuing.
18. First: Interrupt signal occurs.
Second: Machine completes its current instruction.
Third: Machine saves the current program state.
Fourth: Machine begins executing the interrupt routine.
19. The client/server model is a context in which to envision communication between two processes. One process, called the client, makes requests of the other process, called the server. The server process fills the request and returns an appropriate response.
20. CORBA is a standard for communication between objects.
21. LANs and WANs.
22. kermit is the name of the receiver of the message; frogs.animals.com is the mnemonic name of the machine that handles kermit’s e-mail.
23. a. A name server is a process who’s task is to provide assistance in converting mnemonic names into IP addresses.
b. A domain is a part of an internet controlled by a single authority.
c. A router is a machine that connects two networks.
d. A host is a machine in a network.
24. The values 134, 48, 4, and 123 (base ten) are written 10000110, 110000, 100, and 1111011 in base two. Therefore the 32-bit address would be 8630047B in hexadecimal.
25. The internal details of an open network are public knowledge, which allows different organizations to produce compatible products. Such details of a closed network are proprietary, which restricts the ability of organizations to produce their own versions of the network’s components.
26. a. Hypertext is text in which items are linked to other texts in a manner that allows a reader to move between related material.
b. HTML (HyperText Markup Language) is a system for describing the structure of a hypertext document and identifying links between its components and other documents.
c. A browser is a program that presents hypertext documents to a reader .
27. The World Wide Web is the collection of hypertext documents available on the Internet.
28. HTTP is the protocol to be used when accessing the document; frogs.animals.com is the mnemonic name of the machine holding the document; animals/moviestars is the directory path to the document; and kermit.html is the name of the document.
29. A worm promulgates itself through a network; a virus attaches itself to a program.
30. There is no single answer. Possible answers deal with corruption of data, lack of control over access to data, and general vandalism.