subject

This project must target a Unix platform and execute properly on our CS1 server. The project must be written in C, C++, or Java.
Problem Overview
This project will simulate a scheduler scheduling a set of jobs.
The project will allow the user to choose a scheduling algorithm from among the six presented in the textbook. It will output a representation of how the jobs are executed.
Design
You may design your own implementation approach, but here are a few constraints.
Your program should read in a list of jobs from a tab-delimited text file named jobs. txt. The format of the text file should have one line for each job, where each line has a job name, a start time and a duration. The job name must be a letter from A-Z. The first job should be named A, and the remaining jobs should be named sequentially following the alphabet, so if there are five jobs, they are named A-E. The arrival times of these jobs should be in order.
The scheduler choice should be a command-line parameter that is one of the following: FCFS, RR, SPN, SRT, HRRN, FB, ALL. If ALL is input, the program should produce output for all six scheduling algorithms. RR and FB should use a quantum of one. FB should use three queues.
Your output should be a graph as shown in the slides. The graph can be text or you can use a graphics package such as JavaFX to draw the graph. For text, you may draw the graph down the page rather than across.
Your program should be able to reproduce the sample shown in the book as well as any similar set of jobs.
Sample Output
Below is sample text-based output. For graphical output, you can make the graph look like the ones in the textbook and slides.
FCFS
A XXX
B
C
D
E XX
FCFS (this is another way you may print the output instead of the one above)
A B C D E
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 06:20
In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server or network availability confidentiality integrity identity automated attack software? those who wrongfully disclose individually identifiable health information can be fined up to what amount per calendar year? single most expensive malicious attack hipaa what are script kiddies? advanced persistent threat security manager security engineer what level of security access should a computer user have to do their job what process describes using technology as a basis for controlling the access and usage of sensitive data? cybercriminal
Answers: 1
question
Computers and Technology, 22.06.2019 08:10
Alook-up table used to convert pixel values to output values on a monitor. essentially, all pixels with a value of 190 or above are shown as white (i.e. 255), and all values with a value of 63 or less are shown as black (i.e. 0). in between the pixels are scaled so that a pixel with a value p is converted to a pixel of value 2/127 −+3969). if a pixel has a value of 170 originally, what value will be used to display the pixel on the monitor? if a value of 110 is used to display the pixel on the monitor, what was the original value of the pixel?
Answers: 1
question
Computers and Technology, 23.06.2019 18:00
Freya realizes she does not have enough in her bank account to use the debit card. she decides to use a credit card instead. which questions should freya answer before using a credit card? check all that apply. can i pay at least the minimum payment each month? can i make payments on time and avoid late fees? will i have to take out a loan? how much in finance charges can i afford to pay? should i talk to a consumer credit counseling service?
Answers: 1
question
Computers and Technology, 24.06.2019 18:30
Is a type of bullying that takes place when a person intentionally posts negative information about another person that is not true.
Answers: 2
You know the right answer?
This project must target a Unix platform and execute properly on our CS1 server. The project must...
Questions
question
Mathematics, 21.03.2020 10:58
question
Mathematics, 21.03.2020 10:58
question
Mathematics, 21.03.2020 10:59
Questions on the website: 13722367