1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tom [10]
3 years ago
13

Consider a system consisting of m resources of the same type, being shared by n processes. Resources can be requested and releas

ed by processes only one at a time. Show that the system is deadlock free if the following two conditions hold:
A. The maximum need of each process is between 1 and m resources
B. The sum of all maximum needs is less than m+n.
Computers and Technology
1 answer:
Aloiza [94]3 years ago
3 0

Answer:

A=Sum of all needs

B=Sum of all allocations

C=Sum of all max need

Let's say that our system is not deadlock free right now. If the system is in deadlock then sum of all allocations should be equal to the total number of resources i.e. B = m

Now the statement (b) says that sum of all maximum needs is less than m+ n i.e. A + B = C < m + n.

As from above deduction B = m so, A + m < m + n

or A < n, which means that there is one process for which need it zero as number of processes it greater than need and a process can request and release only one resource at a time. So, there are n-1 processes sharing m resources currently. But no process will wait permanently, hence there is a contradiction and there is no deadlock.

You might be interested in
In the context of intentional security threats, _____ can erase data and wreak havoc on computers and networks but do not replic
mihalych1998 [28]

Answer:

The answer is "Option D".

Explanation:

Trojan program is a malicious code that is also known as a virus. It is a rootkit, that aims to infect the computer to hide or obscure an object. These programs are mainly used to download additional content, such as additional pieces of malware, to the infected computer, and other options are wrong that can be defined as follows:

  • In option A, It is not correct, this option infects the system.
  • In option B, It is used for infects another computer that's why it is incorrect.
  • In option C, It is incorrect because it is used in cybersecurity.  
5 0
3 years ago
1. How many column can you insert in a MS Word in maximum?
tigry1 [53]

Answer:

63 columns

Explanation:

In Microsoft Word you can insert a table with up to 63 columns, that is the limit to the number of columns allowed in a Word document.

<em>brainliest</em><em>? </em><em>plz! </em>

3 0
3 years ago
Fill in the blanks:In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human _______
lord [1]

Answer:

In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human <u>weaknesses </u>  by inducing victims to interact with a digital device in a way that is not in their best interest. Many of these attacks begin with<u> spam</u> , which is defined as unsolicited messages that are usually sent in massive numbers using electronic mail systems. A spam  <u>filter</u> uses a set of rules to examine email messages and determine which are spam. There are four common types of spam filters.<u> Content  </u>filters examine the content within a message for certain words or phrases commonly used in spam emails.<u> Header</u> filters review the email header for falsified information, such as spoofed IP addresses. <u>Blacklist</u> filters block mail that originates from IP addresses of known spammers. <u>Permission </u>                    filters block or allow mail based on the sender's address. <u>Phishing</u> is an email scam that masquerades as a message from a(n) legitimate company or agency of authority, such as the IRS. <u>Pharming</u> redirects Web site traffic to fraudulent Web sites that distribute malware, collect personal data, sell counterfeit products, and perpetrate other scams. A rogue <u>antivirus </u>                exploit usually begins with a virus warning and an offer to disinfect the infected device. Some software is not exactly malware, but it is a nuisance. A <u>PUA </u>takes up residence on a digital device and seems impossible to disable or remove.

3 0
3 years ago
Match each network maintenance tool with the purpose that is most closely identified with that tool - Loopback plug - Protocol a
Artist 52 [7]

Solution :

  • Loopback plug --- confirm interface functionality

It is a connector that is used to diagnose the transmission problems.

  • Protocol Analyzer --- Analyze network traffic

It is used to capture and analyze the signals as well as data traffic.

  • Throughput tester - Measure link speed
  • Time Domain Reflectometer (TDR) - Determining the location of cable fault

It is used in determining the characteristics of the electrical lines by observing the reflected waveforms

  • Locating a specific cable - Toner probe

3 0
3 years ago
Which is an aspect of structural level design?
natita [175]

Answer:

The answer to this question is given below in this explanation section.

Explanation:

          "structural level design"

Structural engineer is a sub discipline of civil engineer are strained to design the bones and muscles that create the form and shape of man made structures.Structural engineer needs to understand and calculate the stability,strength and rigidity and earthquake of built structure of building and non building structures.The structural of other design are integrated with those of other designers such are architecture and building services engineer and often supervise the construction of projects by contractors on site.They can also be involved in the design of machinery,medical equipment,and vehicle where structural integrity affects functioning and safety.

Structural engineering theory is based upon applied physical law and empirical knowledge of the structural performance of differents materials and geometrics.Structural engineer engineer are responsible for making creative and efficient use of funds,structural elements and materials to achieve these goals.

7 0
3 years ago
Other questions:
  • Kendall receives an email stating that a leading computer company is giving away free computers, asking her to forward the email
    15·1 answer
  • ListenListen with ReadSpeakerAn administrator working on a Windows Server 2016 Server Core installation needs to disable DHCP on
    9·1 answer
  • Jack has a fear of getting up in front of a group of people and giving a presentation. When he gave his last presentation, he ta
    5·2 answers
  • Write the definition of a function that takes as input the three numbers. The function returns true if the first number to the p
    12·1 answer
  • Which descriptions offer examples of Correction Services workers? Select all that apply.
    8·1 answer
  • SO I LIKE BOILED EGGS AND MY MUM WAS MAKING SALAD FOR DINNER SO I SAID DID YOU MAKE AND EGG-TRA ONE FOR ME
    13·1 answer
  • Who is famous for his three laws of robotics?
    9·1 answer
  • Hola, alguien aquí me podría ayudar dándome ideas a cerca de office (Word, PowerPoint o Excel) estoy desesperada no puedo pensar
    11·1 answer
  • 8. The cell reference for a range of cells that starts in cell A1 and goes over to column G and down to row 10 is, a. A1-G10 b.
    7·1 answer
  • Question 1
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!