5 Dec 2022

131

Shortest Job Next Algorithm (SJN)

Format: APA

Academic level: University

Paper type: Coursework

Words: 894

Pages: 2

Downloads: 0

Task I: Research the maximum and minimum memory capacity of two models of laptop computers. Be sure not to confuse the computer’s memory capacity with its secondary storage. Explain why memory capacity and secondary storage are often confused. Cite the sources of your research. 

The two computer models whose memory capacity is compared are Apple MacBook Air1, 1, and Lenovo IdeaPad 1. The memory capacity of Apple MacBook Air1, 1 is 2 GB at the standard or minimum and 2GB at the official maximum. On the other hand, the memory capacity of Lenovo IdeaPad 1 is 4 GB at the minimum, while the secondary storage of the computer is 128 GB. The primary reason for the confusion experienced regarding secondary storage and memory capacity is that both are referred to as computer memory ( Nosrati et al., 2012 ). 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Furthermore, both also have their parts in the computer organization and particularly perform almost similar purposes. The only difference is that the memory capacity stores data for a short period while the storage memory or the secondary memory stores computer data for a long period. The similarity in both the name and the functioning of the two, except for the period data is saved in each, instigates the confusion experienced by several individuals. The difference between the random access memory and the secondary storage is that the former's data is both transient and temporary. In contrast, data stored in the latter is permanent unless destroyed or deleted. 

Task II: Compare the file storage of two cell phones, such as an iPhone and an Android phone. Research the amount of system software that occupies the main memory after the phone is completely powered on. If the amount of storage used by the system files is substantially different, explain why that may be the case, such as platform issues, features, etc. Cite your sources. 

There are certain differences between the iPhone's file storages compared to that in Android phones. The android phone used in this comparison is the Samsung Galaxy Note 9 of the tenth android version, while the iPhone used in the comparison is the Apple iPhone SE of the IOS 14.01. The android phone in question exhibits an internal memory of 128GB, and the system of the phone uses 17GB leaving 111GB as the phone's workable memory. On the flip side, the iPhone in question exhibits 64GB as its internal memory; the phone system consumes up to 7.25GB, leaving 56.75GB as the phone's workable memory. 

The reason for the substantial difference in the two models' amount of storage consumed by the system files results from the fact that they run in cell phone carriers that are substantially different. For instance, the android phone runs with AT&T while the iPhone uses Verizon. The use of different carriers in the two phones is considered as a reason for the difference in system file sizes because every carrier tends to use the modified as well as different operating systems' versions, and there is usually downloads of personal "bloatware” (Nosratiet al., 2012). The two models also exhibit different features, which may be another reason for the substantial difference in the size of the two compared phones' file storage. 

Task III: Identify four early operating systems for networks (those used before 2010) and explain which network operating systems were and which distributed operating systems were. State the reasons for your answers and cite the sources of your research as well as their publication dates. 

There are several operating systems for networks that were used before 2010. One such operating systems were Windows 98. Windows 98 is chosen because it was vital in offering support for various new technologies. Such technologies range from DVD, FAT32, and MMX to USB, AGP, as well as ACPI (Gude et al., 2008). The Active Desktop was a visual feature that essentially integrated the Web browser called Internet Explorer with the operating system. Another operating system was the Windows Me (Millennium Edition), which was Windows 98 core's update and had additional features of the operating system referred to as the Windows 2000. The option of "boot in DOS" was particularly removed from this version. 

Furthermore, the 32-bit operating system considered to have significantly supported the pre-emptive multitasking was Windows NT 31.-4.0 (Gude et al., 2008). Pointedly, the operating system, Windows NT 31.-41, had two versions, including Windows NT Server as well as Windows NT Workstation. Windows NT Server helped act as a server in networks while the workstation version was for client stations or stand-alone. 

Another operating system was Windows 2000 (W2K), which was meant for business desktop alongside the various laptop systems and ran applications, effectively connected intranet and Internet sites. It was also used to gain access to printers, files as well as network resources. Four versions of Windows 2000 released by Microsoft, including Datacenter Server, meant for the various high-traffic computer networks (Gude et al., 2008). The other version was Professional and was meant for business laptop and desktop systems. The third version of Windows 2000 was the server used in the office and Web server. The last version was the Advanced Server that was essential in the line of business applications. 

Task IV: Multi-core technology can often, but not necessarily always, make applications run faster. Research some real-life computing environments that are expected to benefit from multi-core chips and briefly explain why. Cite your academic sources. 

The examples of some of the real-life computing environment that may benefit from multi-core chips include the Computer-Aided Design (CAD) programs, Virtualization systems, as well as video editing applications or environments (Reichenbach, 2010). Pointedly, the execution in these examples may be significantly improved by multi-core chips. Each flood of data may be processed by a single-center chip, which in turn switches rapidly between various threads and may perform various tasks along those lines (Reichenbach, 2010). Also, multi-core chips have the capability of processing various threads of data simultaneously. The mentioned example programs utilize and also create a significant measure of data in various threads. Importantly, the multi-core may also separate the threads, initiate significant work on them, and convey quicker outcomes. 

References 

Gude, N., Koponen, T., Pettit, J., Pfaff, B., Casado, M., McKeown, N., & Shenker, S. (2008). NOX: towards an operating system for networks. ACM SIGCOMM Computer Communication Review , 38 (3), 105-110. 

Nosrati, M., Karimi, R., & Hariri, M. (2012). Task Scheduling Algorithms Introduction. World Applied Programming , 2 (6), 394-398. 

Reichenbach, F., & Wold, A. (2010, September). Multi-core Technology--Next Evolution Step in Safety-Critical Systems for Industrial Applications?. In 2010 13th Euromicro Conference on Digital System Design: Architectures, Methods, and Tools (pp. 339-346). IEEE. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 15). Shortest Job Next Algorithm (SJN) .
https://studybounty.com/shortest-job-next-algorithm-sjn-coursework

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Security Implication of the Internet of Things

The Internet of Things (IoT) can be described as s system of interconnected devices that have the ability to transfer information over a computer network without the need of human-to-computer or human-to-human...

Words: 892

Pages: 3

Views: 96

Modern Day Attacks Against Firewalls and VPNs

Introduction The need to have an enhanced security of the computer connectivity happens to be one of the reasons that attract companies and organizations towards wide usage of VPNs. Several simple techniques...

Words: 2025

Pages: 7

Views: 134

How to Deploy and Administer Windows Server 2012

Securing a reliable, and expandable configuration for a company is important to build a strong network. The new and enhanced features of the Windows Server 2012 can be used to implement the network. In this...

Words: 1673

Pages: 6

Views: 87

Deployment Model in Cloud Computing

Deployment model is a representation of a cloud environment primarily distinguished by parameters such as accessibility, proprietorship, and storage size. The National Institute of Standards and Technology gives the...

Words: 254

Pages: 1

Views: 81

How to Use Web Search Engines for Business Research

The advancement of technology has made it possible for many people around the world to have easy access to information whenever they want. The development of the Wide World Web-enabled different kinds of information...

Words: 773

Pages: 3

Views: 86

Distributed Database Management System (DDBMS)

Introduction Data management has been a headache to many technology enthusiasts for quite a long period of time. They have successfully managed to logically collect interrelated data and share it. If the data is...

Words: 799

Pages: 3

Views: 127

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration