Deadlock Detection And Recovery

Deadlock Detection and Deadlock recovery are important tasks of OS. If deadlocks are not avoided, then another approach is to detect when they have occurred and recover somehow. These are explained as following below. 1. Deadlock Detection : If resources have single instance : If cycle exist in the Resource Allocation Graph, then there exist deadlock in the… Read More »

Process Schedulers in Operating System

A scheduler is a type of system software that allows you to handle process scheduling. There are mainly three types of Process Schedulers: Long Term, Short Term, Medium Term. These are explained as following below. Long Term or job scheduler : Long term scheduler is also known as job scheduler. It chooses the processes from the pool (secondary… Read More »

Goals and Applications of Networks

A network consists of two or more nodes (e.g. computers) that are linked in order to share resources (such as printers and CDs), exchange files, or allow electronic communications. The computers on a network may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams. Networking Elements : The computer network includes the following networking… Read More »

Dual Mode of Operating Systems

Dual-mode operation forms the basis for I/O protection, memory protection and CPU protection. Two modes are provided by the hardware – user and kernel mode. Mode bit is added to computer hardware to indicate the current mode. When system boots, hardware starts in kernel mode. The OS is loaded and then user process is started in user mode.… Read More »

Types of Network Topology

Network Topology is the representation of a network arrangement, consisting of several nodes i.e. sender and receiver nodes, and the lines connecting these nodes. Types of Network Topology : Let us look at the type of Network Topologies available. P2P Topology : Point-to-point topology is the easiest of all the network topologies. In this method, the network consists… Read More »

C Program to Check Vowel or Consonant

In this article, you will learn to check whether an alphabet entered by the user is a vowel or a consonant. English alphabets a, e, i, o and u both lowercase and uppercase are known as vowels. Alphabets other than vowels are known as consonants. We check whether given character matches any of the 5 vowels. If yes,… Read More »

Linear Search

In this tutorial, you will learn about linear search. Linear search is a very simple and basic search algorithm. It is basically a sequential search algorithm. We have to write a C Program which finds the position of an element in an array using Linear Search Algorithm. Examples : Input : arr[] = {40, 60, 10, 20, 50,… Read More »

Users in DBMS environment

Database Management System (DBMS) is used to optimize and manage the storage and retrieval of data from databases. DBMS offers a systematic approach to manage databases and workloads accessing the databases. DBMS allows users to create their own databases as per their requirement. DBMS has various advantages and properties over traditional file system. In this article, we learn… Read More »