What is the difference between multitasking and
multiprogramming?
Answers were Sorted based on User's Feedback
Answer / rahul gupta
MULTI TASKING IS THE ABILITY TO EXECUTE MORE THAN ONE TASK AT SAME TIME..............IN MULTI TASKING, ONLY ONE C.P.U IS INVOLVED............
IT IS OF TWO TYPE............PREEMPTIVE & CO-OPERATIVE..
IN MULTI PROGRAMING, SEVERAL PRGM RUNS AT THE SAME TIME IN UNIPROCESSOR ,....IN THIS....C.P.U EXECUTE ONE PRT OF ONE PRGRM THAN ONE PRT OF ANOTHER PRGRM...........THTS WHY ITS LOOK LIKE THT ALL PRGRM EXECUTE AT A SAME TME.............
THE CMN THNG B/W M.P & M.T THT BOTH HAVE SINGLE PROCESSOR..............
Is This Answer Correct ? | 3 Yes | 3 No |
Answer / raychael wanja
multitaskig is when there is more than one user
task in cpu while multiprogramming is where there is
more than one proccesor in cpu
Is This Answer Correct ? | 9 Yes | 16 No |
Why is my computer so slow?
Give some examples of use of thread in a single user multiprocessing system
wha is very first process created by kernel
What does the g in gnu stand for?
How can I increase storage on my laptop?
How do you pronounce gnu?
What causes a computer not to boot up?
Dear All, When the patches are installed in the server OS, how will we know that which patch is the latest patch?
Is heap shared between processes?
Assuming feedback to the adversary flugging an error as each incorrect character is entered, what is the expected time to discover the correct password?
Assume that passwords are selected from four-character combinations of 26 alphabetic characters. Assume that an adversary is able to attempt passwords at a rate of one per second. a) Assuming no feedback to the adversary until each attempt has been completed, what is the expected time to discover the correct password?
Assuming one link of the Trojan horse copy-and-observe-later chain is broken. There are two other possible angles of attack by Alice: Alice logging on and attempting to read the string directly, and alice assigning a security level of sensitive to the back-pocket file. Does the reference monitor prevent these attacks?