Browse Definitions :
Definition

true multitasking

True multitasking is the capacity of an operating system to carry out two or more tasks simultaneously rather than switching from one task to another. 

The multi-core processors  in most current computers enable true multitasking because each core can be performing a separate task at any given time.  Examples of multitasking include running an MP3 player and a word processor application simultaneously and processing email while streaming a webinar.

A task, in this context, is a basic unit of programming that an operating system controls. Because tasks are defined differently from one OS to another, the unit of programming identified as a task may be an entire program or successive invocations of a program. A program may make requests of other utility programs, in which case the utility programs may also be considered tasks (or subtasks). 

In single-core processors, multitasking is actually accomplished by time-sharing processor resources – tasks aren’t actually simultaneous but the operating system shifts quickly between tasks, ideally transparently to the user. The operating system monitors where the user is in these tasks and goes from one to the other without losing information.  

Human multitasking is similar to the asynchronous multitasking of single-core processors. Although people experience their multitasking as simultaneous, they are actually switching back and forth from one thing to another, in terms of brain processing. In any kind of multitasking, performance degrades as more tasks are processed.

This was last updated in August 2013
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • COBIT

    COBIT is an IT governance framework for businesses wanting to implement, monitor and improve IT management best practices.

  • email spam

    Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.

  • security policy

    A security policy is a document that states in writing how a company plans to protect its physical and information technology (IT...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • JBOD (just a bunch of disks)

    JBOD, which stands for 'just a bunch of disks,' is a type of multilevel configuration for disks.

  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

Close