Browse Definitions :
Definition

true multitasking

True multitasking is the capacity of an operating system to carry out two or more tasks simultaneously rather than switching from one task to another. 

The multi-core processors  in most current computers enable true multitasking because each core can be performing a separate task at any given time.  Examples of multitasking include running an MP3 player and a word processor application simultaneously and processing email while streaming a webinar.

A task, in this context, is a basic unit of programming that an operating system controls. Because tasks are defined differently from one OS to another, the unit of programming identified as a task may be an entire program or successive invocations of a program. A program may make requests of other utility programs, in which case the utility programs may also be considered tasks (or subtasks). 

In single-core processors, multitasking is actually accomplished by time-sharing processor resources – tasks aren’t actually simultaneous but the operating system shifts quickly between tasks, ideally transparently to the user. The operating system monitors where the user is in these tasks and goes from one to the other without losing information.  

Human multitasking is similar to the asynchronous multitasking of single-core processors. Although people experience their multitasking as simultaneous, they are actually switching back and forth from one thing to another, in terms of brain processing. In any kind of multitasking, performance degrades as more tasks are processed.

This was last updated in August 2013
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • bare-metal cloud

    Bare-metal cloud is a public cloud service that offers dedicated hardware resources without any installed operating systems or ...

  • race condition

    A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at ...

  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

Close