Question

Of the following, which is/are true about the process of swapping a page out of DRAM...

Of the following, which is/are true about the process of swapping a page out of DRAM and into disk:You can select more than one

  1. The Operating System chooses which page to move from DRAM to disk

  2. The program whose page is getting swap from DRAM to disk was the program that triggered the fault.

  3. The valid bit of the page that is moved from DRAM to disk is set to 1

  4. The operation of swapping page will be faster if the page being replace has not been modified.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Answer:

Following statements are true:

The Operating System chooses which page to move from DRAM to disk.

The program whose page is getting swap from DRAM to disk was the program that triggered the fault.

The operation of swapping page will be faster if the page being replace has not been modified.

Explanation:

The valid bit of the page that is moved from DRAM to disk is set to 1 is false because

Valid bit is an indication to say that page present in DRAM is valid. If we bring page from disk to ram we set valid bit as 1
because the page currently is valid. When we move that page from DRAM to disk we set it as 0 as it has become invalid now.

Please give thumbsup, if you like it. Thanks.

Add a comment
Know the answer?
Add Answer to:
Of the following, which is/are true about the process of swapping a page out of DRAM...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • A page daemon in an operating system will swap out memory even if some memory is...

    A page daemon in an operating system will swap out memory even if some memory is still available. Will it do this when the amount of available memory is -- above (a), or below (b) -- the low watermark? What do you call the piece of OS software that is run when it is discovered that a page of memory is on disk, and not in memory? a) the overlay, b) the background process, or c) the page-fault handler. Swapping...

  • Question 1 Which of the following is true about virtual addresses? Virtual addresses for the same...

    Question 1 Which of the following is true about virtual addresses? Virtual addresses for the same physical memory location may differ from process to process Virtual addresses are synonymous with physical addresses Virtual addresses always refer to locations on disk Virtual addresses for the same physical memory location may differ from thread to thread Question 2 How do pages and frames relate to each other? A page holds words while a frame holds pictures A frame is a larger structure...

  • True / False & MCQ 1. Which of the following is true? there are 8 bits...

    True / False & MCQ 1. Which of the following is true? there are 8 bits in a byte there are 8 bytes in a bit there are 8 tracks in a sector there are 8 sectors in a track none of the above A disk drive writes data from RAM onto a disk storage medium. Computer software can be divided into two categories; the operating system and the applications system. The microprocessors used on personal computers can only understand...

  • Question 9 Which of the following statements is true about memory system? Put the answer in...

    Question 9 Which of the following statements is true about memory system? Put the answer in the box. A. Cache memories are usually built by SRAMs, which have higher density and faster access speed than DRAM-based main memories. B. Secondary storages such as hard disk drive and solid-state drive are typically volatile memories. C. Compared to the associative cache mapping function, direct mapping function has more flexibility. D. Due to locality of reference, the basic transfer unit between cache and...

  • whats the answer When defining a class which has the field name of type String. How...

    whats the answer When defining a class which has the field name of type String. How is the name field declared? String nam name Opublic String name; private name; private String name; Given the following class definition, Which operation can a class user perform on an object of type Restaurant? public class Restaurant // Info about a restaurant // Internal fields public void setName(String restaurant Name) { // Sets the restaurant's name } public void setRating(int user Rating) { //...

  • starter code To write a program using the starter code which is TestLinkedList to see if...

    starter code To write a program using the starter code which is TestLinkedList to see if the LinkedList program has bugs. It will produce ether a pass or fail.More information is in the first two pictures. LinkedList.java /** * @author someone * * Implements a double-linked list with four errors */ public class LinkedList<E> { // The first and last nodes in the list private Node<E> head, tail; // Number of items stored in the list private int size; //...

  • Which of the following criteria should be used to choose a project if there is a...

    Which of the following criteria should be used to choose a project if there is a conflict between two mutually exclusive projects? A. The project whose payback period is equal to the expected years required to recover the original investment should be chosen. B. The project whose internal rate of return is higher than its modified internal rate of return should be chosen. C. The project whose discounted payback period is longer than its traditional payback period should be chosen....

  • TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for...

    TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program. 2. Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values. 3. The biggest change of the nature in Windows XP SP2 was to change all anonymous remote procedure call (RPC)...

  • Infix Expression Evaluator For this project, write a C program that will evaluate an infix expression. The algorithm REQ...

    Infix Expression Evaluator For this project, write a C program that will evaluate an infix expression. The algorithm REQUIRED for this program will use two stacks, an operator stack and a value stack. Both stacks MUST be implemented using a linked list. For this program, you are to write functions for the linked list stacks with the following names: int isEmpty (stack); void push (stack, data); data top (stack); void pop (stack); // return TRUE if the stack has no...

  • Infix Expression Evaluator For this project, write a C program that will evaluate an infix expression. The algorithm REQ...

    Infix Expression Evaluator For this project, write a C program that will evaluate an infix expression. The algorithm REQUIRED for this program will use two stacks, an operator stack and a value stack. Both stacks MUST be implemented using a linked list. For this program, you are to write functions for the linked list stacks with the following names: int isEmpty (stack); void push (stack, data); data top (stack); void pop (stack); // return TRUE if the stack has no...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT