1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alchen [17]
3 years ago
14

If we can lock a file, we can solve the race condition problem by locking a file during the check-and-use window, because no oth

er process can use the file during the time window. Why don’t we use this approach to solve the race condition problems discussed in this chapter?
Computers and Technology
1 answer:
yKpoI14uk [10]3 years ago
5 0

Answer:

A file can only be locked out to other users or processes only if it's already open, meaning it's in use as a resource during the time window and therefore it's impossible solving the race condition problem by locking the file during the check-and-use window.

Hence, during the check-and-use process, it's impossible to lock a file.

In conclusion, any lock created can be ignored by the malicious process.

You might be interested in
. Constructors are executed when?
adoni [48]

Answer:

 The constructor are executed when the constructor object are comes in the existence as per the general rule in the computer programming language. The constructor is the special type of the class function that basically perform the initialization of the each object in the computer science.

Then, the constructor initialized actual value of the member of an object are allocated to the given object in the system.  

6 0
3 years ago
HELP!!!!!!!! my keyboard keeps acting up every time I press a random key on my keyboard when it stops working it works perfectly
iogann1982 [59]

Answer:

try unplugging it and replugging it in, make sure your keyboard is clean, that there aren't any crumbs underneath the keys.

they using it on a different device and see if it does the same thing.

Explanation:

5 0
3 years ago
Indicate whether the following actions are the actions of a person who will be a victim, or will not be a victim, of phishing at
Zepler [3.9K]

Answer:

Phishing Victim

Explanation:

Replying to this email could make you a victim of a phishing scam. Phishing attacks are common challenges on security that internet users are faced with. It could lead to others getting hold of sensitive information like your password or bank details. email is one way the hackers used to get this information. replying to such an email could lead one to an unsecure website where information could be extracted

4 0
3 years ago
The Receiver recognizes the sounds the Sender is making and transforms them into words and ideas in his own mind. What is this
pishuonlain [190]

Answer:

Decoding is the technique used to convert an electrical signal into an understandable message. This process is used in receiver side.

Explanation:

In telecommunication, Decoder is used to to interpret the message sent by transmitter in to an understandable message. This process is called decoding

5 0
3 years ago
Also known as the hard disk, the ______ is the primary storage device of a personal computer. You can also buy an external _____
Stolb23 [73]

Another name for hard disk is called; Hard Drive

The external hard disk is called; External Hard drive

<h3>Computer storage devices</h3>

In computers there are different ways of storing information and all could come under the name drives but the primary storage of a computer which is called hard disk is also called hard drive.

Now, the hard drive could be internal or external and so the one to store additional information is called External Hard Drive.

Read more about Computer Storage Devices at; brainly.com/question/19667078

5 0
2 years ago
Other questions:
  • A small company connects data acquisition equipment to the serial port of a computer. The equipment user has reported that not a
    8·1 answer
  • 10 facts about turbines
    11·2 answers
  • Define the following concepts: computer network, network architecture, protocol, and multilayer protocol.
    11·1 answer
  • Jamie is preparing a presentation on his laptop for his college annual event. He inserts audio and video files into the presenta
    11·2 answers
  • In what software development model does activity progress in a lock-step sequential process where no phase begins until the prev
    7·1 answer
  • Consider the problem of making change for n cents using the fewest number of coins. Assume that each coins value is an integer.
    7·1 answer
  • Which of the following statements about cover letters is false?
    14·2 answers
  • Electrical sign connect mainly to​
    8·1 answer
  • ASAP BRAINLIEST
    13·2 answers
  • Joe is a florist and wants to increase his client base. How can he achieve this with the help of a computer?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!