It is a non preemptive algorithm which means the process priority doesn’t matter. Thus if high priority process waits,the system will crash because of improper process scheduling.
No optimal average waiting time.
Resource's utilization in parallel is not possible which leads to convoy effect and hence poor resource utilization.
Softwaretech answered the question on April 27, 2019 at 09:40
- List and explain five functions of an operating system(Solved)
List and explain five functions of an operating system.
Date posted: April 27, 2019. Answers (1)
- Explain the following types of schedulers. (a)long term scheduler. (b)short term scheduler. (c)medium term scheduler(Solved)
Explain the following types of schedulers.
(a)long term scheduler.
(b)short term scheduler.
(c)medium term scheduler
Date posted: April 27, 2019. Answers (1)
- Describe conditions of process scheduling queues(Solved)
Describe conditions of process scheduling queues.
Date posted: April 27, 2019. Answers (1)
- Explain the two general categories of process scheduling(Solved)
Explain the two general categories of process scheduling.
Date posted: April 27, 2019. Answers (1)
- Define the term process scheduling thus state its aims(Solved)
Define the term process scheduling thus state its aims.
Date posted: April 27, 2019. Answers (1)
- Describe process control block (pcb).(Solved)
Describe process control block (PCB).
Date posted: April 27, 2019. Answers (1)
- Outline various process states(Solved)
Outline various process states.
Date posted: April 27, 2019. Answers (1)
- Explain various divisions of process memory(Solved)
Explain various divisions of process memory.
Date posted: April 27, 2019. Answers (1)
- Differentiate between a process and a program(Solved)
Differentiate between a process and a program.
Date posted: April 27, 2019. Answers (1)
- Give at least two functions of assemblers, interpreters and compilers(Solved)
Give at least two functions of assemblers, interpreters and compilers.
Date posted: April 23, 2019. Answers (1)
- Define the term bugs as used in programming(Solved)
Define the term bugs as used in programming.
Date posted: April 23, 2019. Answers (1)
- Define the following terms as used in structured programming. (a)programming language. (b)structured programming. (c)programming paradigms(Solved)
Programming language is a set of written symbols that instructs the computer on how to perform tasks.
Structured programming is a technique of organizing computer program under which a hierarchy of modules is followed.
Programming paradigms-is the way of classifying programming languages according to the style of computer programming.
Date posted: April 23, 2019. Answers (1)
- What is an access modifier? Discuss the various types of access modifiers.(Solved)
What is an access modifier? Discuss the various types of access modifiers.
Date posted: April 12, 2019. Answers (1)
- Communication facilities in the world are systematically being upgraded from analog to digital facilities. Discuss any three reasons behind the very significant movement(Solved)
Communication facilities in the world are systematically being upgraded from analog to digital facilities. Discuss any three reasons behind the very significant movement
Date posted: April 2, 2019. Answers (1)
- Describe the guidelines that assist system auditors detect and deter fraud occurrences in an organization(Solved)
Describe the guidelines that assist system auditors detect and deter fraud occurrences in an organization
Date posted: March 27, 2019. Answers (1)
- Discuss cryptography as used in computer networking(Solved)
Discuss cryptography as used in computer networking
Date posted: March 26, 2019. Answers (1)
- Explain the advantages of fiber optic cables as used in networking
(Solved)
Explain the advantages of fiber optic cables as used in networking
Date posted: March 26, 2019. Answers (1)
- Explain the concept of distributed processing in networking
(Solved)
Explain the concept of distributed processing in networking
Date posted: March 26, 2019. Answers (1)
- Outline the computer IP security architecture groups.(Solved)
Outline the computer IP security architecture groups.
Date posted: March 15, 2019. Answers (1)
- Explain the THREE stages of a computer software testing.(Solved)
Explain the THREE stages of a computer software testing.
Date posted: March 13, 2019. Answers (1)