In this blog, we will see one of the deadlock avoidance methods i.e. Banker's Algorithm. In this algorithm, we will discuss that if we are given the number of resources available and the number of resources required by the process then we can tell that if the system will go in deadlock or not. We will understand this concept with the help of an example.
In this blog, we will learn various types of constraints that can be applied on a table. These constraints can be used to validate the data present in the table. We will learn about NOT NULL, UNIQUE, PRIMARY KEY, FOREIGN KEY, CHECK, and DEFAULT
In this blog, we will learn about threads and its two types i.e. user-level thread and kernel-level thread. We will also see what are the advantages of using threads in the OS. Finally, we will learn about the difference between process and thread
In this blog, we will learn about various multithreading models like one-to-one, many-to-one, and many-to-many. We will compare these models and analyze which one is the best. Further, we will also see the benefits of multithreading.
In this blog, we will learn about two non-contiguous memory allocation technique i.e. paging and segmentation. We will also learn how the logical address is converted into the physical address in both the techniques. Further, we will analyze the advantages and disadvantages of each technique.
In this blog, we will learn about the two types of addresses that are used for memory in the operating system. Further, we will discuss the difference among these types of memories i.e. logical memory and physical memory.
In this blog, we will learn about the concept of subnetting, why it is done and how it is done. Further, we will learn about supernetting, why it is done and how it is done. We will also see how the supernet mask of any network is calculated.
In this blog, we will learn the difference between Multiprogramming, Multiprocessing, and Multitasking. These terms come into play when we talk about our processes and the processors. Let's see the difference between these.
In this blog, we will learn what is a deadlock situation, what are various deadlock handling techniques like deadlock prevention, deadlock avoidance, deadlock detection, and deadlock ignorance.
In this blog, we will learn what are the various types of classes in IPv4 and how we can differentiate among the classes on the basis of the number of bits present the network ID and the host ID of these classes.
In this blog, we will learn what is a proxy server, how does it work and what are the various types of proxy servers. We will also see why we should use a proxy server and what are the risks associated with it.
In this blog, we will learn what is Address Resolution Protocol and how it helps in communication between two devices. We will also discuss what are the problems that can arise while using this protocol and see sample examples of ARP packets which are captured.
In this blog, we will learn one of the flow control method i.e Stop and Wait Protocol. We will discuss various situations that can occur while transmitting the data. We will also mathematically derive the efficiency and the throughput of this protocol.
In this blog, we will learn about the various network traffic types, that are - Unicasting, Anycasting, Multicasting, and Broadcasting. We'll also see their advantages and disadvantages along with their differences.
In this blog, we will learn about different data transmission modes based on the direction of exchange, synchronization between the transmitter and receiver, and the number of bits sent simultaneously in a computer network.
In this blog, we will learn about the various keys like the super key, candidate key, primary key, alternate key and foreign key. We will discuss how to identify and differentiate between them with examples.
In this blog, we will learn what is an attribute, its various types and symbols used to represent them. We will see various types of attributes such as single & multi-valued attributes, simple & composite attribute, stored & derived attribute and key attribute.
In this blog, we will study various types of relationships in DBMS which help in defining the association between various entities. Also, we will discuss the types of participation constraints which may exist between the relationship and the entity type.
In this blog, we will learn what is an entity, entity type and entity set and how these terms are related. We will learn the difference between these terms as these terms are often used interchangeably. We will take various examples to understand this.
In this blog, we will see how an ER model is used in database designing. We will also see how an ER model is made using various components of the ER diagram. We will also discuss the features of an ER model along with its advantages and disadvantages.
In this blog, we will learn about various process scheduling algorithms used in Operating System. We will learn about FCFS, SJF, SRTF, Round-Robin, Priority-based, Highest Response Ratio Next, Multilevel Queue, and Multilevel Feedback Queue scheduling.
In this blog, we will learn what an Operating System is and what are the goals of an Operating System. We will also learn the functionalities of an Operating System that helps in achieving the goal of the OS.
In this blog, we will learn about the Context Switching in the Operating System. We will learn all the steps involved in Context Switching and in the end, we will see the advantages and disadvantages of Context Switching also.
In this blog, we will learn about various types of times that we come across during using some CPU scheduling algorithms i.e. Burst time, Arrival time, Exit time, Response time, Waiting time, Turnaround time, and Throughput.