1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erastova [34]
3 years ago
13

-Give a definition of the critical section problem and explain the purpose of the entry and exit code blocks

Computers and Technology
1 answer:
Alisiya [41]3 years ago
6 0

Answer: In operating system a code segment which accesses  some shared variables or resources one at a time atomically such other no other code or process is accessing that resource or variable at the same time.

Entry section code block allows the access to the shared resource or variable and exit section code signals the termination from access to the shared resource or variable.

Explanation:

Entry and exit section codes needs to check certain properties before allowing the access and removal of access to a particular code segment.

These conditions are:

1. Bounded waiting.

2. Mutual exclusion.

3. checking thread execution status to allows other threads to enter the critical section (CS).

You might be interested in
Whoever answers first gets lots of points
zimovet [89]
Firssstttttt ayyyyyyeeeeeeeeeeeee
8 0
3 years ago
Read 2 more answers
You are going to do a bubble sort on the following list. What are the missing members of the list? Select 3 options.
Nadya [2.5K]
The bubble sort makes multiple passes through a list. It compares adjacent items and exchanges those that are out of order. Each pass through the list places the next largest value in its proper place. In essence, each item “bubbles” up to the location where it belongs.
4 0
3 years ago
Read 2 more answers
Describe the concepts of Defense in Depth and Detection in Depth. Compare and contrast. What's different? What's similar?
olchik [2.2K]

Answer:

 The main concept of the defense in depth is that the various defensive mechanism series are used for protecting the data and the information in the system. This approach is basically used multiple layers to control the cyber security. It also mainly provide the redundancy for controlling the security failure in the system.

The detection in depth basically provide the redundant overlapping approach and it is used for detecting the security and also accomplish the response that are available in the security detection.  

5 0
3 years ago
* Create a list of places and situations in which we use a computer
Vinvika [58]

Answer:

Place:

Coffee shop. Railway Reservation System, Airport Reservation System, Machine learning and a long list follow.

Situation:

We find that there is a similar type of calculation and in bulk. Thus we can create a piece of software, and run that with the help of a computer to solve our problem of tackling the massive number of clients.

Description:

The situation demands a similar sort of calculation, and we can hence make a program or most favorably a software that can do all these calculations for us. A perfect example is a coffee shop, which has 100 to 1000 customers drinking coffee each second. And you can understand how badly they need a computer and software. This cannot be done manually.

Explanation:

Please check the answer section.

5 0
3 years ago
Which function is going to find the lowest value in a range of numbers? MIN MAXAVERAGE COUNT
never [62]
Min is the correct bicycle
8 0
3 years ago
Other questions:
  • Semiconductor memory is used mainly for primary storage even with its high cost. In another hand, the magnetic tape is the cheap
    6·1 answer
  • If a simple pipelined processor is super-pipelined by a factor of 3 (the ALU takes 3 cycles instead of one for the smallest oper
    15·1 answer
  • Using the _______ list, you can select the number of photos that will appear on each slide.
    13·1 answer
  • What connector has 4 pins, is used for older IDE drives and some SATA drives, and can provide +5 V and +12 V power outputs?
    11·1 answer
  • . Two blue armies are each poised on opposite hills preparing to attack a single red army in the valley. The red army can defeat
    5·1 answer
  • Explain how computer system is different from computer in 150 words
    14·1 answer
  • What happens if a computer lags too much?
    14·2 answers
  • Which of the following items can you locate in a document using the navigation pane? Choose the answer.
    10·1 answer
  • Explain why you would use the soft on/off jumper when working on ATX system
    14·1 answer
  • you are currently logged in using the badams account. you want to view the contents of the /etc/inittab file, but you are not al
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!