What is the difference between multitasking and
multiprogramming?

Answers were Sorted based on User's Feedback



What is the difference between multitasking and multiprogramming?..

Answer / rahul gupta

MULTI TASKING IS THE ABILITY TO EXECUTE MORE THAN ONE TASK AT SAME TIME..............IN MULTI TASKING, ONLY ONE C.P.U IS INVOLVED............
IT IS OF TWO TYPE............PREEMPTIVE & CO-OPERATIVE..

IN MULTI PROGRAMING, SEVERAL PRGM RUNS AT THE SAME TIME IN UNIPROCESSOR ,....IN THIS....C.P.U EXECUTE ONE PRT OF ONE PRGRM THAN ONE PRT OF ANOTHER PRGRM...........THTS WHY ITS LOOK LIKE THT ALL PRGRM EXECUTE AT A SAME TME.............

THE CMN THNG B/W M.P & M.T THT BOTH HAVE SINGLE PROCESSOR..............

Is This Answer Correct ?    3 Yes 3 No

What is the difference between multitasking and multiprogramming?..

Answer / raychael wanja

multitaskig is when there is more than one user
task in cpu while multiprogramming is where there is
more than one proccesor in cpu

Is This Answer Correct ?    9 Yes 16 No

Post New Answer

More Operating Systems AllOther Interview Questions

Why is my computer so slow?

0 Answers  


Give some examples of use of thread in a single user multiprocessing system

0 Answers  


wha is very first process created by kernel

0 Answers   IBM, TATA,


What does the g in gnu stand for?

0 Answers  


How can I increase storage on my laptop?

0 Answers  


How do you pronounce gnu?

0 Answers  


What causes a computer not to boot up?

0 Answers  


Dear All, When the patches are installed in the server OS, how will we know that which patch is the latest patch?

0 Answers   Wipro,


Is heap shared between processes?

0 Answers  


Assuming feedback to the adversary flugging an error as each incorrect character is entered, what is the expected time to discover the correct password?

0 Answers  


Assume that passwords are selected from four-character combinations of 26 alphabetic characters. Assume that an adversary is able to attempt passwords at a rate of one per second. a) Assuming no feedback to the adversary until each attempt has been completed, what is the expected time to discover the correct password?

4 Answers   FCI,


Assuming one link of the Trojan horse copy-and-observe-later chain is broken. There are two other possible angles of attack by Alice: Alice logging on and attempting to read the string directly, and alice assigning a security level of sensitive to the back-pocket file. Does the reference monitor prevent these attacks?

0 Answers  


Categories