1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bearhunter [10]
3 years ago
13

Explain why Windows and Linux implements multiple locking mechanisms. Describe the circumstances under which they use spinlocks,

mutex locks, semaphores, and condition variables. In each case, explain why the mechanism is needed.
Computers and Technology
1 answer:
galben [10]3 years ago
8 0

Answer:

The description for the given question is described in the explanation section below.

Explanation:

Depending on the needs of the device programmers these OS have various locking frameworks. Spinlocks become beneficial for preemptive multitasking processes during which a thread will operate in such an active loop instead of risking a rest queue latency. Mutexes become beneficial to utility lockers.

  • Solaris 2 employs flexible mutexes, indicating something like this on preemptive multitasking computers, the mutex is introduced with either a spinning switch.
  • Semaphores and state variations are much more effective methods for consistency where a commodity needs to be managed for such a prolonged period of time because spinning is unstable over a prolonged time.

You might be interested in
A malicious user in your organization was able to use the Trinity Rescue Kit to change the password on a department manager's co
netineya [11]

Answer:

The answer is "The PC should be kept in a physically secure location".

Explanation:

In general, malicious users are hackers as well as malicious users. This user indicates that even a rogue worker, contractor, student, and another consumer who uses his sensitive rights is indeed a common word of violation of information in security circles and the headlines, and to manage the data from the theft the system should be on the physically secure location, that refers to any place, a room or a group of room within facilities of physical or staff security protocols that are sufficient to support the AI-based on LEIN and related Is a physically safe room.

7 0
3 years ago
What is the decimal equivalent of 11BA?
allsm [11]

Answer:

To convert hexadecimal number 11BA to decimal, follow these two steps:

Start from one's place in 11BA : multiply ones place with 16^0, tens place with 16^1, hundreds place with 16^2 and so on from right to left

Add all the product we got from step 1 to get the decimal equivalent of 11BA.

Using the above steps, here is the work involved in the solution for converting 11BA to decimal number (Don't forget that we start from ones place to so on...)

Decimal equivalent of "A" = (A) 10 × 16^0 = 10

Decimal equivalent of "B" = (B) 11 × 16^1 = 176

Decimal equivalent of "1" = 1 × 16^2 = 256

Decimal equivalent of "1" = 1 × 16^3 = 4096

Decimal equivalent of "11BA" = 409625617610

11BA = 4538

Here is the final answer, The hexadecimal number 11BA converted to decimal is therefore equal to:

4538

4 0
2 years ago
If you aren’t familiar with the idea of a leap year, read “Why Is There a Leap Day?” before continuing with the lab.
Zinaida [17]

The correct debugged code is attached below

<h3>What is a leap year </h3>

A leap year is a year with 366 days and this year occurs once every 4 years. The debugged code line of code of the program written, is as attached below. because the line of code in the question lacks some functions and symbols

Hence we can conclude that the correct debugged code is attached below.

Learn more about Python coding : brainly.com/question/16397886

#SPJ1

6 0
2 years ago
For the past five days, the Howard family has traveled these miles: 389;126;419;93; and 394. Find the range and how. Show all yo
Fofino [41]
The answer is 326.

Range is found by subtracting the smallest number in the data set from the largest number.

Highest number: 419
Lowest number: 93

419-93
=326

(Next time make sure to post this under the Mathematics section.)
5 0
3 years ago
Explain the ten characteristics of a digital computers​
Paul [167]

Answer:

The major characteristics of computers are the following:

Speed : A powerful computer is capable of executing about 3 million calculations per second.

Accuracy : A computer's accuracy is consistently high; if there are errors, they are due to errors in instructions given by the programmer.

Reliability : The output generated by the computer is very reliable as long as the data is reliable.

Memory/Storage Capacity : The computer can store large volumes of data and makes the retrieval of data an easy task.

Versatility: The computer can accomplish many different things. It can accept information through various input-output devices, perform arithmetic and logic operations, generate a variety of outputs in a variety of forms, etc.

Automation: Once the instructions are fed into computer it works automatically without any human intervention.

Diligence: A computer will never fail to perform its task due to distraction or laziness.

Convenience: Computers are usually easy to access, and allow people to find information easily that without a computer would be very difficult.

Flexibility: Computers can be used for entertainment, for business, by people who hold different ideals or who have varied goals. Almost anyone can use a computer, and computers can be used to assist with almost any goal.

<em>I hope it helps you!!!!</em>

6 0
3 years ago
Other questions:
  • I plugged my phone up into a charger, the charger sparked and i unplugged my phone and now it wont charge at all, does anyone kn
    13·1 answer
  • Ipv6 includes a native information security framework (ipsec) that provides both data and control packets. true false
    15·1 answer
  • A _______ is smaller than a notebook or laptop and has a touchscreen and sometimes a pointing device.
    13·1 answer
  • Question 3 of 10
    13·1 answer
  • Why do we need IP Addresses in order for the Internet to function properly?
    7·1 answer
  • What is the multiple source test
    15·1 answer
  • Write an application that determines which, if any, of the following files are stored in the folder where you have saved the exe
    10·1 answer
  • Write a java program to create and display unique three digit number using 1,2,3 and 4 also count how many three digit number ar
    10·1 answer
  • What is the optimal number of members for an Agile team?
    10·1 answer
  • Which component is most likely to allow physical and virtual machines to communicate with each other?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!