Browse Definitions :
Definition

true multitasking

True multitasking is the capacity of an operating system to carry out two or more tasks simultaneously rather than switching from one task to another. 

The multi-core processors  in most current computers enable true multitasking because each core can be performing a separate task at any given time.  Examples of multitasking include running an MP3 player and a word processor application simultaneously and processing email while streaming a webinar.

A task, in this context, is a basic unit of programming that an operating system controls. Because tasks are defined differently from one OS to another, the unit of programming identified as a task may be an entire program or successive invocations of a program. A program may make requests of other utility programs, in which case the utility programs may also be considered tasks (or subtasks). 

In single-core processors, multitasking is actually accomplished by time-sharing processor resources – tasks aren’t actually simultaneous but the operating system shifts quickly between tasks, ideally transparently to the user. The operating system monitors where the user is in these tasks and goes from one to the other without losing information.  

Human multitasking is similar to the asynchronous multitasking of single-core processors. Although people experience their multitasking as simultaneous, they are actually switching back and forth from one thing to another, in terms of brain processing. In any kind of multitasking, performance degrades as more tasks are processed.

This was last updated in August 2013
SearchNetworking
  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

SearchSecurity
  • data breach

    A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed or disclosed in an...

  • insider threat

    An insider threat is a category of risk posed by those who have access to an organization's physical or digital assets.

  • data compliance

    Data compliance is a process that identifies the applicable governance for data protection, security, storage and other ...

SearchCIO
  • data privacy (information privacy)

    Data privacy, also called information privacy, is an aspect of data protection that addresses the proper storage, access, ...

  • leadership skills

    Leadership skills are the strengths and abilities individuals demonstrate that help to oversee processes, guide initiatives and ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchHRSoftware
SearchCustomerExperience
  • recommerce

    Recommerce is the selling of previously owned items through online marketplaces to buyers who reuse, recycle or resell them.

  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

Close