Answer:
a) 4 processes
b) 2 resources
c) R1: 2 instances
R2: 2 instances
d) R2
e) R1
f) R1
g) No resource
h) R1
i) R2
j) R2
k) No
l)No deadlock
Explanation:
You need to know that the resources that are required by the processes for completion are shown by the request edge and the resources allocated are shown by the allocation edge. And thus, we can find what resources are allocated to the process, and required for the completion accordingly. And here again, the cycle is created, and hence deadlock may or may not occur. However, we see that resources have multiple instances and get freed on time. And hence, deadlock does not occur.
Like,
P4 uses R2 and free one instance of R2.
P3 then uses one instance of R2 and free R2.
P3 then uses one instance of R3 and free R3.
P1 uses one instance of R1 and free R1 one instance
P1 then uses R2 and free R2.
P2 uses R1 and free R1.
Hence, all the processes are complete and deadlock does not occur.
Answer:
By connecting a printer to many print devices
Explanation:
By connecting one printer to many printer allows all the printers connected to act as one single printer this technique is called "pooling", this helps when the print work is so heavy that one printer can't possibly handle. This feature is available in Windows 7 Operating system and other windows computers, this technique is used when there are many computers in the office and this improves productivity.
Answer:
The answer is "starving"
Explanation:
In the server, starvation occurs when a transaction is waiting for an infinite time to get a lock, which could not be done on many grounds, like as unequal priorities or any kind of resource leakage, etc.
- In the Database, it is not feasible. It also known as results from several actions, which reduce the population's access.
- It establishes the high mortality rates in a background of severe abuse over a significant time, and other choices were not correct because it can't be defined, in the given scenario.
Answer:
Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. The goal of computer forensics is to perform a structured investigation and maintain a documented chain of evidence to find out exactly what happened on a computing device and who was responsible for it.
Explanation:
If this helped you, please consider brainly.
Thank you ,
Miss Hawaii
Answer:
C It is believable or trust worthy