1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alchen [17]
3 years ago
14

If we can lock a file, we can solve the race condition problem by locking a file during the check-and-use window, because no oth

er process can use the file during the time window. Why don’t we use this approach to solve the race condition problems discussed in this chapter?
Computers and Technology
1 answer:
yKpoI14uk [10]3 years ago
5 0

Answer:

A file can only be locked out to other users or processes only if it's already open, meaning it's in use as a resource during the time window and therefore it's impossible solving the race condition problem by locking the file during the check-and-use window.

Hence, during the check-and-use process, it's impossible to lock a file.

In conclusion, any lock created can be ignored by the malicious process.

You might be interested in
Why do relational databases use primary keys and foreign keys?.
Andrew [12]

Answer:

Explanation:

A relational database is designed to enforce the uniqueness of primary keys by allowing only one row with a given primary key value in a table. A foreign key is a column or a set of columns in a table whose values correspond to the values of the primary key in another table.

8 0
2 years ago
Marty uses a customized database to sort parts and track inventory. The customized database is an example of _____.
Alexeev081 [22]

cataloging is a term for that

5 0
3 years ago
All of the following are forms of verbal communication except
Radda [10]
B. hand gestures
these are not verbal.
4 0
2 years ago
Read 2 more answers
Why do most people share, especially photos online using social media?
Nadusha1986 [10]
“3. To get attention from others (brag)”
8 0
3 years ago
Read 2 more answers
​You work for a company that is growing. Originally, all the users in all departments had access to all the data in the database
jeyben [28]

Answer:

B. Assign roles and privileges to users so that only job-relevant data is accessible to the user.

Explanation:

Certain departments will require certain information for certain processes. It is not recommendable for every user to access every information of the company as it may reveal vital information.

Hence, every role and department should be given certain privileges to information according to the tasks and needs of the role.

5 0
2 years ago
Other questions:
  • Which type of topology describes the physical arrangement, installation, and connection of cables, computer, and other devices?
    10·2 answers
  • . char values are surrounded by _____ quotes
    15·1 answer
  • Why is it important to be a good digital citizen??
    11·1 answer
  • ____ devices are high-performance storage systems that are connected individually to a network to provide storage for the comput
    12·1 answer
  • Although designed to support remote dial-in access to a corporate network, what service below is commonly used with 802.1x port
    12·1 answer
  • Computer keyboard failures can be attributed to electrical defects or mechanical defects. A repair facility currently has 25 fai
    14·1 answer
  • Write a program that asks you to enter some integers, and press "enter" after each one.
    13·1 answer
  • How do u type faster
    5·1 answer
  • Which of the following is a table which can be rearranged to analyze data in a variety of ways?
    13·1 answer
  • ¿Qué son las tecnologías modernas?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!