Ali Shan (System and NetWork Administration)
Ali Shan (System and NetWork Administration)
LAB MANUAL
(System and Network Administration)
Submitted By:
Submitted To:
INTRODUCTION
The objective of this lab manual is to give students step-by-step examples to become
familiar with programming concepts, design, and coding.
F E AT U R E S
To ensure a successful experience for instructors and students alike, this lab manual
includes the following features:
Content Page
Lab No:1
• How many type of User Account you have ? Create at least three User With
different Names.
Lab No:5
• What is the concept of virtulization ? And How you can install/configue two
OS on same system give good explaination.
1
Lab No:9
• What is window Server and how u can Install Window Server 2012 with your
existing client Machine.
Lab No:10
Lab No:11
Lab No:12
Lab No:15
Activity No. 1:
• Error Handling: OSes monitor the system for errors and hardware failures,
providing error messages and recovery mechanisms to minimize disruptions.
Network Operating Systems: Manage network resources and facilitate file sharing
and communication among multiple computers.
Mobile Operating Systems: Optimized for smartphones and tablets, offering app
ecosystems and touch-based interfaces.
Embedded Operating Systems: Tailored for specific hardware and tasks,
commonly found in IoT devices, appliances, and automotive systems.
Lab2:
How to connect multi computing devices and share folder through
Internet also describe what is Internet and history of Internet.
Step: 7 Select Windows key and r (w+r) for Pingging and write the ip address
that we got in step 1 and Click OK
Step:8 The shared folder will look like this after successfully being shared
1
1
What is Internet:
The Internet, often referred to simply as "the Net," is a global network of
interconnected computer networks that allows billions of devices, including
computers, smartphones, tablets, servers, and more, to communicate with each other.
It is a vast infrastructure that facilitates the exchange of information, data, and
services across the world.
History Of Internet
• Dot-Com Boom (Late 1990s): The late 1990s saw a rapid increase in Internet
usage and the emergence of numerous internet-based companies during the
dot-com boom. Many of these companies, however, experienced the dot-com
bubble burst in the early 2000s.
• Web 2.0 and Social Media (Mid-2000s): The concept of Web 2.0 emerged,
emphasizing user-generated content, collaboration, and social interaction
online. Platforms like Facebook, YouTube, and Twitter gained immense
popularity.
• Cloud Computing (2010s): The 2010s saw the rise of cloud computing
services, which enabled users to store and access data and applications
remotely. This technology transformed the way businesses and individuals use
and manage digital resources.
So, The history of the Internet is marked by innovation, collaboration, and rapid
growth, transforming the world into a globally connected society where information,
communication, and commerce are conducted on a scale that was unimaginable just
a few decades ago. Its evolution continues to shape our modern world in countless
ways.
Lab3:
What is utility program ? And also Apply system utilities practices.
1.Disk Defragmentation
Defragmentation is a process which helps reduce the amount of fragmentation in file
systems. Utility programs function by organizing the disk content and storing the
pieces of each file together. It also helps create large amount of free space using
compaction to impede the return of fragmentation. This happens when any operating
system is unable to allocate space for storage as single unit. Steps :
• Select the search bar on the taskbar and enter defrag.
• Select Defragment and Optimize Drives.
• Select the disk drive you want to optimize.
• Select the Optimize button.
1
2.Disk Clean-up
With the help of utility program in computer, users can remove the unnecessary
files that are taking up the space in their system.By removing unused files, the
system will be able to increase the storage space and optimize the overall speed of
the system. Steps :
1. In the search box on the taskbar, type disk cleanup, and select Disk Cleanup from
the list of results.
2. Select the drive you want to clean up, and then select OK.
3.Under Files to delete, select the file types to get rid of. To get a
description of the file type, select it. Select OK.
1
3.File Management
With the help of file management program, users can perform various functions
related to the files saved in the system, such as searching, renaming, opening,
renaming deleting and grouping.
Compression
One of the biggest concerns of any computer system is its storage space. With
time, the limited storage space in the hard disk starts getting smaller. Therefore,
with the help of compression program such as WinZip and WinRAR, important
yet unused files can be compressed, stored and easily extracted when required.
1
4. Compression
One of the biggest concerns of any computer system is its storage space. With time,
the limited storage space in the hard disk starts getting smaller. Therefore, with the
help of compression program such as WinZip and WinRAR, important yet unused
files can be compressed, stored and easily extracted when required.
Steps:
5. Done.
2
5. Disk Management
Disk Management is one of the most vital programs that an operating system like
Windows provides. With the help of the system utility software and program,
users can seamlessly manage various drives such as hard drives, optical drives,
flash drives, etc. It helps users in partitioning drives, allocating spaces, format
drives, and much more.
Lab4:
How many type of User Account you have ? Create at least three User
With different Names.
• Open Settings.
• Click on Accounts.
• Click on Family & other users.
• Under the "Your family" section, click the Add a family member
option.
• Select the Add a member option.
• Click the Invite button.
• Click the Confirm option.
• Click the Close button.
2
• Open Settings.
• Click on Accounts.
• Click on Family & other users.
• Under "Your family" section, click the Add a family member
option
• Click on Create one for child.
• Write email.
• Add Password.
• Enter First and Last name.
• Select country and enter DOB.
2
3
Local Account:
• Open Settings.
• Click on Accounts.
• Click on Family & other users.
• Under the "Other users" section, click the Add someone else to
this PC option.
• Click the I don't have this person's sign-in Information
option.
• Click the Add a user without a Microsoft account option.
• Confirm the username.
• Create a password.
3
Lab5:
Disk Management:
Disk Management is one of the most vital programs that an operating system like
Windows provides. With the help of the utility program, users can seamlessly
manage various drives such as hard drives, optical drives, flash drives, etc.
3
• Open
• Extend volume. Create new volume Shrink volume.
• Delete volume.
• Change Volume / partition letter.
• Change File System type.
Open: Is just to open the selected volume in Windows Explore.
Shrink Volume:
3
Delete volume:
3
Extend Volume:
5
Lab6:
How to create a USB bootable through Rufus .
5
Rufus is one of several programs that allow you to create an “ISO image” on a USB
stick. To create a bootable USB using Rufus, all you need is:
Step 1: Open up Rufus and plug your clean USB stick into your computer.
Step 2: Rufus will automatically detect your USB. Click on Device and choose the
USB you want to use from the drop-down menu.
Step 3: Make sure the Boot Selection option is set to Disk or ISO image then click
Select. Rufus will open a file explorer browser window; locate the ISO image you
want to burn onto the USB and select it.
5
5
Step 5: Give the Volume label a name of your choice, or leave it as it is, and once
again leave the default settings for File system and Cluster size. Now click Start
5
Note: if the USB you’re using isn’t large enough, you’ll get an error message you
letting you know. In this case, you’ll need to start again with a different larger USB.
Step 6: You’ll get a warning saying that any data on the USB will be destroyed (this is
normal). Click OK and Rufus will start creating the ISO image on the USB.
Step 7: Once Rufus has finished creating the ISO image on the USB, you can close it
and your bootable USB is ready to go!
Lab7:
5
Windows Security
Administrative Tools
The programs can be used to schedule a test of your computer's memory, manage
advanced aspects of users and groups, format hard drives, configure Windows
services, change how the operating system starts, and much, much more.
5
if(n%i==0){
Device Manager
It is used to view and manage all the hardware devices installed on a computer, such
as hard drives, sound cards, USB devices, keyboards, and so on.
Uers Account
A user account is a collection of settings and permissions, specific to a user, that
determines what a user can and cannot do on the computer. These settings
are also used to protect the user's files and folders from access by other
nonauthorised people
5
Troubleshooting
Troubleshooters initially look for common, known causes. For example, when
a laptop won't boot up, an obvious first step is to check whether the power cable
is working. Once common issues are ruled out, troubleshooters must run through
a checklist of components to identify where the failure is happening.
Steps:
Uninstall Program
Uninstall is the process of removing or deleting an application or software from
electronic devices such as a personal computer, laptop, smartphone, cellphone,
etc. Uninstall helps in removing applications or programs that are not
functioning or working properly, are outdated or are not being used
anymore
5
Internet Option
The Internet Options section of Control Panel allows you to manage Internet and
Internet Explorer settings for your computer. You can configure security settings
and access settings. You can control add-ons, Active-X controls, and other
components.
5
Lab8:
What is the concept of virtulization ? And How you can install/configue two
OS on same system give good explaination.
Lab9:
What is window Server and how u can Install Window Server 2012 with
your existing client Machine.
Step: 3
Once you click next, you can start the installation, click "Install now“
Step: 4
Select Windows Server 2012 Data Center Evaluation
6
Step:5
Read the License terms, tick the "I accept the license terms" and click Next
Step: 6
Select the drive (or partition) you want to install Windows on.
Here I'm installing it on the one partition I have here
6
Step: 7
Now once we picked our partition, clicking on next from previous screen will
start the setup. This process might take a while
Step: 8
Once the setup is done, it will restart and start your Windows Server 2012 for
the first time
6
Step: 9
It will ask you then to set up country region for the Administrator user
Step: 10
When the setup is done, it will restart and start your Windows Server 2012 for the
first time. It will ask you then to set up a password for the Administrator user
6
Step: 11
Once the setup is done, you can log in for the first time to your Windows
Server, as the screen says, press Ctrl+Alt+Delete to log in, and use the
password you set in the setup process
Step 12:
Enter Password
6
Step: 13
Open the server manager from the taskbar
Step: 14
Once you Log in, Windows Server 2012 will show the Server Manager
6
Lab10:
Installation and Configuration of Active Directory (AD)
Active Directory stores information about objects on the network and makes this
information easy for administrators and users to find and use.
From the Server Manager dashboard, select Add roles and features
The Roles and Features Wizard launches. This wizard enables you to make modifications to the
Windows Server 2012 instance Click Next.
6
On the Installation Type screen, select Role-based or features based and click next.
7
On the Server Roles screen, select the check box next to Active Directory Domain Services.
7
On the Select features screen, Active Directory Domain Service installation process and click on
Next Button.
7
In next window it will gives more options to select additional feature to install. Keep the
default selection. click next to install
7
7
After you have installed the AD DS role, you must configure the server for
your domain by using the following steps:
From the task bar, click Open the Server Manager.
Select the yellow notifications icon in the top navigation bar of the Server
Manager window.
Select Radial options > Add a new forest. Enter your root domain name in the Root domain
name field and click next button.
Select a Domain and a Forest functional level. Remain it by defaultReview the warning on
the DNS Options tab and Click Next.
7
Specify the locations of the Database, Log files, and SYSVOL folders, and then Click Next.
7
The system checks if all of the prerequisites are installed on the system. If the system passes
these checks, Click Install.
7
Lab11:
• Creating Organizational Units in AD
• Create Users and Groups with OU
• Move Users from One OU to another OU
• Create Nested Groups
So, Click Organizational Unit to create a “New Organizational Unit” and then give
its name and click ok
8
Now, for creating Users go to Own “Organizational Unit” Right click go to New
Then go to User and click it to add New User
8
Click to Group to Create “ New Group” Give its Name and Keep Group
Scope default and Ok
Into order to move User Right Click User Click to Move then select
Organizational unit where you want to move your user.
8
Keep in mind these OU are different from one and other Nested Couple of
Groups Within another Group
Write Name and click “Check Names” this automatically will fetch related name
9
Here you can see Both Groups are Nested into Management Group and
become the member of this Group
9
Lab12:
Installation and Configuration of DNS (Domain Name Service)
DNS in Windows Server is a service responsible for translating domain names into
IP addresses, allowing computers to locate each other on networks. It plays a critical
role in Active Directory, resolves hostnames, and stores resource records for various
network services.
Click Next
Click Next
Click Next.
Click Install.
9
Installation in progress.
9
Configuration of DNS
• Create Forward lookup Zone
• Reverse Lookup Zone
• Here are the forward and reverse lookup zones on left side of DNS
manager.
1
• To create Forward lookup zone right click on forward lookup zone and
select New zone.
1
Click Next.
This dialogue box shows the complete details of the forward zone that
you have created and then click finish.
To create new host right click on the zone that you have created and
select “New Host (A or AAAA)”.
1
• The host is now created and the host is pointing to the IP address.
1
• To create Reverse lookup zone right click on reverse lookup zone and
select New zone.
• Click Next.
Click Next
Click to Finish
Select and Ok
1
Lab13:
Installation and Configuration of DHCP (Dynamic Host Configuration
Protocol).
• DHCP stands for Dynamic Host Configuration Protocol.
• Network management protocol
• DHCP is used to dynamically assign an IP address and other networking
parameters to any device.
2. Here will be given some instructions, read them carefully and then click
“Next”.
4. Select your server, here is only one selected by default. Simply click “Next”.
6. Checking the box of “DHCP Server” will result in new window showing the
features that will be added by default. Simply click “Add Features”.
8. Read the short introduction and requirements of “DHCP Server” and click
“Next”.
9. Role is ready to be installed with some features. Click the “Install” button.
1
10. Server is installed successfully. Close the window by clicking the “Close”.
3. Close the window and configuration as well by clicking on the “Add Roles
and Features” button.
1
2. This is the interface of DHCP Server. Expand the only given sever under
DHCP named “win-7p2hd486v7u”.
1
4. After expanding IPv4 right click on IPv4 and then click on “New Scope” in
which range of IPs will be defined.
1
5. New Scope Wizard welcoming you, will be popped out. Click on “Next”.
6. Give a Name to the scope and click “Next” after describing it, but it is not
mandatory.
1
7. Here the New Scope Wizard is asking for Start IP address and End IP
address for your pool. Provide it and click “Next”.
10. By default selected Lease Duration is 8 days and can be up to 1000 days.
Keeping it default, click “Next”.
12. Write the Router’s IP or default gateway. After clicking “Add”, click
“Next”.
1
13. Provide DNS Server’s IP address that you want to assign to your client and
after clicking “Add”, click “Next”.
14. WINS Server address was used in older versions for networking. So, click
“Next” without putting something.
1
15. Here wizard is asking for the activation of this scope. Keeping it default
click “Next”.
16. Scope has been created successfully. Close the wizard by clicking “Close”.
1
17. Restart your DCHP Server by right clicking on it, go to All Tasks and click
on Restart.
18. Now your DHCP Server is ready to use and have a scope consisting a pool
of IPs to assign to the clients.
1
IP Reservation:
1. Expand the created scope and right click on Reservations and then click on
“New Reservation…”.
2. Write name, IP address and MAC address and left other options as they are
by default “Add Roles and Features”.
1
5. Still the client has not renewed its IP, that’s why it is inactive.
6. Now the client has renewed its IP to the reserved one for it, that’s why it is
active now.
1
Lab14:
Create User and Group Apply Group Policies.
Group Policy is a hierarchical infrastructure that allows a network administrator in
charge of Microsoft's Active Directory to implement specific configurations for
users and computers.
Group Policy allows administrators to define options for what users can do on
a network.
Provides a hierarchical and organized approach to managing policies.
Levels include the entire domain, individual organizational units (OUs), or
specific user.
Creating Group:
1. Right Click on the Organizational Unit that is Presentation.
2. Move the cursor to the New.
3. Then Selects the Group.
1
1. Open Dashboard.
2. Click on tools.
3. Select Group Policy
Management.
1. Now we are going to apply the policy Prohibit access to Control Panel 2.
Now right click on the policy and then Click on Edit
To apply this policy to the Users and Groups ,Click on the Add Button at the bottom.
1
Lab15:
Installation and Configuration AD, Create Domain and Rename Domain
name
Installation and Configuration already done into previous Lab Now, just
“Rename the Domain Name” For this create New Forward lookup Zone
1
1
Now, go into C derive look domainlist file and open it and change all old domain name
with new domain name and I changed “Ali.com to shan.com”
But NetBIOSName keep in upper case
After this your system will reboot and show pop up click close
1
Now you will switch your user click Arrow and select other and then login
With Administration and your actual password such as
1
In Order to verify go local sever and look you domain name it will be change
Now I required some few requirements about domain So, again come into
Terminal and run these commands
1. gpfixup /olddns:Ali.com /newdns:shan.com
2. gpfixup /oldnb:dc /newnb:shan
3. rendom/clean
4. random/end
1
Now Domain Name will be updated from old to new But in my case is
“ Ali.com to shan.com ”
Lab16:
Apply Active Permissions Using Share folder and NTFS
"Active Permissions" typically refers to the current set of permissions or access
rights granted to a user, system, or application for specific resources or actions
within a computer system, network, or software application. These permissions
determine what actions a user or system is allowed to perform and what resources
they can access.
Before going to Apply premissions Using Share folder and NTFS kindly
enable their machines settings such as
There will be three kind of Networks Private, Public and All Networks enable
these option from each network
1. Private Network:
Enable “Network discovery” and “ File and printer sharing”
2. Public Network :
Enable “Network discovery” and “ File and printer sharing”
3. All Networks
Enable “Public Folder Sharing” and disable “Password Protected Sharing”
2. Now, Click on the sharing tab and click the share button.
3. Next, Choose which person you want to add and click on the “add” button.
1
4. Choose the desired person as I have choosen the “Everyone” and then, Click
on permission level to allow the desired permissions.
1
7. Enable the “Share this folder” and click on the permissions button
1
9. As, I have allowed all the permissions here. Next, Click on Apply and then
click OK.
1
10. On RUN, Type the IP address of the other system and Click OK
1
3. From user, click on everyone and for changing permissions click edit.
5. Now, disable the Inheritance permission for the desired folder and click “
Convert inherited permissions into explicit permissions on this object.
6. We have the disabled inheritance turned on , Just simply click apply and ok.
Finally, we can access to the desired folder on the other system using NTFS.
1
Lab17:
DOS to Linux cheat sheet
Now,we are going to run linux commands to perfoms different tasks ………
1. touch command (for create a file)
1
Deleted Directory
Lab18:
Installation of Linux Operating System flavor (ubantu) using VMW
First of all run your vmw and click create New Virtual Machine
Then you can see your ubantu iso file into Browse box
1
Give space for Installing ubantu recommended space is 20GB and Next
1
Keep relax it coping “some files and requirements” for running properly
1
Just continue ….
Install ubantu OS
Copying files……..
1
1
Lab19:
Linux Text Editors (VI, VIM, JOE)
VIM Editor: An enhanced version of Vi, Vim introduces additional features like syntax
highlighting, split screens, and plugins, maintaining Vi's modal structure while providing
a powerful and extensible text editing environment.
JOE Editor: Joe is a text editor for Unix-like systems designed to be user-friendly and
accessible to users familiar with other text editors like WordStar and Emacs. It is known
for its simplicity and ease of use.
Press Enter then it will open file “AliShan” and press “i” to Insert text
After writing something then press :wq (for save and quite)
1
VIM Editors:
First of all, install vim using command such as “sudo apt install vim”
1
It will Open File Then You Can Write Something But as like VI Commands
1
JOE Editor:
First of all, install joe using command such as “sudo apt install jeo”
Write joe with file name and then it will open into editor same file
Here Write Something into your file and press for (save and exit)
Ctrl +K
Ctrl+X
1
Lab20:
• Squid is a proxy cache server which provides proxy and cache services for
Hyper Text Transport Protocol (HTTP), File Transfer Protocol (FTP), and
other popular network protocols.
• It acts as an intermediary between web servers and clients. When a client sends
a request for content, Squid fetches the content from the web server and creates
a local copy. Then, if a request is made again, it shows the local, cached copy
instead of making another request to the web server. In this way, performance
is improved and network bandwidth is optimised. It can also filter web traffic,
helping to improve security.
Key Features:
Caching: Squid caches frequently requested web content, such as images, web
pages, and other objects, locally. This reduces the need to fetch the same
content repeatedly from the internet.
Proxy: Squid acts as an intermediary between client machines and web
servers. Clients send their requests to Squid, and Squid forwards those
requests to the web servers.
Access Control: Squid allows administrators to control access to the internet
by defining rules and policies. This includes specifying which clients or
networks are allowed to access certain content.
Now install squid by using the command “ sudo apt-get install squid”
Here Change the access from deny all to allow all and block the file that
contains the domains to be blocked
Blocked websites
LAMP Stack
A LAMP stack is a bundle of four different software technologies
Linux (Operating System)
Apache (Web Server)
MySQL (Database Server)
PHP (Scripting Language)
They provide a proven set of softwares for delivering high-performance web
applications. It's widely used for hosting dynamic websites and web applications.
Here's a brief overview of how these components interact in a typical LAMP setup:
Client Request:
When a user makes a request by entering a URL into their browser, a request is sent to
the Apache web server.
2
Apache:
Apache receives the request and, based on its configuration, forwards PHP requests to
the PHP processor.
PHP:
PHP processes the server-side script embedded in the requested web page. It can
interact with the MySQL database to fetch or update data dynamically.
MySQL:
MySQL handles the storage and retrieval of data requested by PHP scripts. It stores
information such as user accounts, content, and other application data.
Response:
The dynamic content generated by PHP, possibly incorporating data from the MySQL
database, is sent back to the Apache web server.
Apache:
Apache delivers the final web page, incorporating the dynamic content generated by
PHP, to the user's browser.
Use the following command “sudo apt-get install apache2” to install Apache.
Check all the softwares installed in the server using “sudo ufw app list”
Write http://localhost
2
Go to the browser, and enter localhost/lamp.html. It will show the web page.
2
Type sudo mysql to run MySQL so that we can alter the user.
To confirm that php has been installed, check the version by using command
php version
And write the following php code > press ctrl+x to exit.
Lab21:
Implementation of Preferences in window Server 2012
Manage settings for applications, control panel items, and network components
Not as strict - users can sometimes make changes, but preferences can be re-applied
by administrators.
Examples:
Configuring things like mapped drives, printer settings, and other personalization
options.
2. Click on Edit
2
In target path select the folder whose shortcut we want to create on desktop
Lab22:
Implementation of LINUX Permission
The ls -al command in Linux is used to list detailed information about files and
directories in a directory.
Here's a breakdown of what each part of the commanddoes:
Previous I changed permission of file “shan” and change user to verify either it
apply to other user or not
2
Now I am going to apply permission on user group “group user” first I create
group and then add user to that group .
Here I switch user and I check this user have only read permission .
How I Changed permission of individual user and want to keep same for other
users by using Absolute mode?
Lab23:
Scheduling Algorithms ( FCFS , SJF, Priority and Round Robin )
First-Come-First-Serve (FCFS):
Description: The simplest scheduling algorithm where processes are executed in the
order they arrive.
Advantages: Easy to understand and implement.
Disadvantages: Poor in minimizing waiting time, especially for long processes.
#include<iostream>
wt[0] = 0;
void findTurnAroundTime(int processes[], int n, int bt[], int wt[], int tat[]) {
cout << "Processes " << " Burst time " << " Waiting time " << " Turnaround time\n";
total_wt += wt[i];
total_tat += tat[i];
cout << " " << processes[i] << "\t\t" << bt[i] << "\t "
2
// Driver code
int main() {
int n;
cin >> n;
int processes[n];
int burst_time[n];
cout << "Burst time for process " << i + 1 << ": ";
findavgTime(processes, n, burst_time);
return 0;
}
2
#include<iostream>
int main()
int n,temp,tt=0,min,d,i,j;
float atat=0,awt=0,stat=0,swt=0;
cout<<"enter no of process"<<endl;
cin>>n;
int a[n],b[n],e[n],tat[n],wt[n];
for(i=0;i<n;i++)
cin>>a[i];
for(i=0;i<n;i++)
cin>>b[i];
}
2
for(i=0;i<n;i++)
for(j=i+1;j<n;j++)
if(b[i]>b[j])
temp=a[i];
a[i]=a[j];
a[j]=temp;
temp=b[i];
b[i]=b[j];
b[j]=temp;
min=a[0];
for(i=0;i<n;i++)
if(min>a[i])
min=a[i];
d=i;
tt=min;
e[d]=tt+b[d];
tt=e[d];
for(i=0;i<n;i++)
if(a[i]!=min)
2
e[i]=b[i]+tt;
tt=e[i];
for(i=0;i<n;i++)
tat[i]=e[i]-a[i];
stat=stat+tat[i];
wt[i]=tat[i]-b[i];
swt=swt+wt[i];
atat=stat/n;
awt=swt/n;
for(i=0;i<n;i++)
Priority Scheduling:
Description: Each process is assigned a priority, and the process with the highest
priority is selected for execution.
Advantages: Allows for priority assignment based on factors like importance or
deadlines.
2
#include<iostream>
#include<algorithm>
#include<vector>
struct Process {
int processId;
int burstTime;
int priority;
int waitingTime;
int turnaroundTime;
};
});
processes[0].waitingTime = 0;
}
2
cout << p.processId << "\t\t" << p.burstTime << "\t\t" << p.priority << "\t\t"
totalWaitingTime += p.waitingTime;
totalTurnaroundTime += p.turnaroundTime;
cout << "\nAverage Waiting Time: " << totalWaitingTime / processes.size() << endl;
cout << "Average Turnaround Time: " << totalTurnaroundTime / processes.size() << endl;
int main() {
int n;
cin >> n;
2
vector<Process> processes(n);
cout << "Enter burst times and priorities for each process:\n";
cout << "Process " << i + 1 << " - Burst Time: ";
calculateTimes(processes);
displayResults(processes);
return 0;
#include <iostream>
using namespace std;
int t = 0;
while (1)
{
bool done = true;
if (done == true)
break;
}
}
int main()
{
int n;
int processes[n];
int burst_time[n];
int quantum;
return 0;
}
2