1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anettt [7]
3 years ago
6

Consider a situation where we have a file shared between many people.  If one of the people tries editing the file, no other pe

rson should be reading or writing at the same time, otherwise changes will not be visible to him/her.  However if some person is reading the file, then others may read it at the same time. Precisely in OS we call this situation as the readers-writers problem Problem parameters:  One set of data is shared among a number of processes  Once a writer is ready, it performs its write. Only one writer may write at a time  If a process is writing, no other process can read it  If at least one reader is reading, no other process can write  Readers may not write and only read
Computers and Technology
1 answer:
Sergeu [11.5K]3 years ago
7 0

Explanation:

I am a collection of this process from Trash on the computer system and the program that included a new twist on the computer and the skin that appears after loading and the Windows operating system it was much that appear on identifying long horizontal bar at the bottom of the screen and water pollution and its control car parts of the computer with enough letters and adware if for the collection of the fat calculation in the complete committee that in the water method is a product of a screensaver been disciplined displayed at the subject of the right click an icon To Number Sau new file getting opened on you can getting opened on a forgiving of an operational effectiveness of the program is a false false false

You might be interested in
A Trojan horse:
Elis [28]

Answer:

The answer is "option D"

Explanation:

Trojan horse is a software, that is installed on a system and appears benign, but in actual it is the addition of malicious which unexpected modifications in config files and unusual activity even when the computer is idle are strong signs that a Trojan exists on a system. and other options are not correct that can be described as follows:

  • In option A, It is a malware that is also known as Trojan.
  • In option B, It is malware, not a virus but the malware includes viruses.
  • In option C, It doesn't install spyware on the user's computer.
  • In option E, It doesn't use for enterprise networks to penetrate.
4 0
3 years ago
Type the correct answer in the box. Spell all words correctly.
Ugo [173]

Answer:

Business format franchise or Business Brokers

Explanation:

8 0
3 years ago
Which spreadsheet feature could the scholarship committee use to locate applicants who meet the criteria?
Radda [10]

Answer:

H8

Explanation:

4 0
3 years ago
What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source?]
MrRa [10]

Answer:

The correct answer to the following question will be "Checksum".

Explanation:

A variable that reflects the amount of several bits in a transmitted packet and is used by practitioners of IT to spot heavy-level anomalies in the transmission of data, known as Checksum.

  • After executing a cryptographic hashing algorithm each piece of information or a document could be allocated a value of checksum before delivery.
  • We are relevant because we are using them to verify the authenticity of the documents.

So, it's the right answer.

3 0
3 years ago
Which word processing file that contains text and other
Oksi-84 [34.3K]

Answer:

B . document

Explanation:

Word document contains text, table, picture and more. Word document is a file of .doc, .docx etc format

Table, ribbon or keyboard can't be classed as a file and they are elements of a file, menu or hardware

<u>So correct option is</u> B. Document

7 0
3 years ago
Read 2 more answers
Other questions:
  • Most licensing agencies offer an orientation meeting for applicants who want to obtain licensing for a child care facility or a
    12·2 answers
  • To add artwork to a slide, the slide must contain a placeholder. <br> a. True <br> b. False
    10·1 answer
  • The _device provides a means of communication between a computer and outer world.​
    14·1 answer
  • To delete a row, you must first
    8·1 answer
  • Explain three ways in which tables make it easier to understand data
    6·2 answers
  • When measuring processor speed,a megahertz is much faster than a gigahertz.true or fals
    12·1 answer
  • Excel files have a default extension of ?
    12·1 answer
  • In which situation is coauthoring of presentations primarily utilized?
    9·1 answer
  • What is 4x+2x(-3-3) thanku
    11·2 answers
  • I need an If else statement that sorts three numbers from a file from least to greatest
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!