1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katrin [286]
3 years ago
14

Consider a system consisting of processes P1 , P2 , ..., Pn , each of which has a unique priority number. Write a monitor that a

llocates three identical printers to these processes, using the priority numbers for deciding the order of allocation.
Computers and Technology
1 answer:
adelina 88 [10]3 years ago
7 0

Answer:

See explaination

Explanation:

The code

type printer = monitor

var P: array[0…2] of boolean;

X: condition;

procedure acquire (id: integer, printer-id: integer);

begin

if P[0] and P[1] and P[2] then X.wait(id)

if not P[0] then printer-id := 0;

else if not P[1] then printer-id := 1;

else printer-id := 2;

P[printer-id]:=true;

end;

procedure release (printer-id: integer)

begin

P[printer-id]:=false;

X.signal;

end;

begin

P[0] := P[1] := P[2] := false;

end ;

Note:

Monitors are implemented by using queues to keep track of the processes attempting to become active int he monitor. To be active, a monitor must obtain a lock to allow it to execute the monitor code. Processes that are blocked are put in a queue of processes waiting for an unblocking event to occur.

You might be interested in
Timeliness is an important goal of any access control monitoring system.<br> A. True<br> B. False
Damm [24]
The answer for this question is true
7 0
3 years ago
1a. Ust Seven (7) Components of a Computer?
san4es73 [151]

Explanation:

1a. i know only 4 components of computer these are users, data,hardware & software

1b.users,the person who use the computer

data,it is the collection of raw facts and figures

hardware,is the physical part of the computer that can be seen and touch

software,is a set of program that instruct the computer to perform the certain action

2a,an internet is worldwide systen of interconnected computer network

2b.if some student want to now about something he can use internet and get the answer,to commenicate with others,and to learn online

8 0
2 years ago
In implementing Secunity Lfe Cycle:_______
KIM [24]

Answer:

c

Explanation:

because its inportant



7 0
3 years ago
Surprisingly, many of us may be unknowing victims of botnets. Because of the rising sophistication of botnet schemes, your compu
Virty [35]

Answer:

a. Simple rules

1. Upgrade your operating system

2. Upgrade your softwares regularly

3. Upgrade your browser when new additions are available

4. Change your password very often

b. Suspensious signs

1. The operating system and programs take a longer while to start up.

2. It shows lack of storage space despite having space

3. The PC crashes regularly

4. If the sent mails are received as spam

5. The hard disk is working excessively while no programs are currently running

C. All the part of a security incident should be logged.

Explanation:

a. Simple rules

1. Upgrade your operating system

2. Upgrade your softwares regularly

3. Upgrade your browser when new additions are available

4. Change your password very often

b. Suspensious signs

1. The operating system and programs take a longer while to start up.

2. It shows lack of storage space despite having space

3. The PC crashes regularly

4. If the sent mails are received as spam

5. The hard disk is working excessively while no programs are currently running

Explanation:

C. All the part of a security incident should be logged.

7 0
3 years ago
Describe the three-schema architecture. Why do we need mappings among schema levels? How do different schema definition language
VARVARA [1.3K]

Answer:

Three Scheme architecture contains internal level, conceptual level, and external level.

In the internal level physical structure of the database described. The internal Schema is also known as physical Schema, as it is used to define the data that stored in a block. Internal Schema describes a sophisticated level of data structure in detail.

The conceptual level design of the database has described, and it is known as a logical level. The conceptual level describes the whole structure of the database. It describes the relationships among the data. Implementation of data are hidden in a theoretical level

On the external level, databases contain schemas that represent a different view of the database. Each describes the database that the user interested in and hides the remaining database. The external database is also known as view schema.

Explanation:

The mappings between schema levels happen due to visualization and schema matching. DBMS has three schema level.

In the attached diagram

It shows the DBMS architecture.

Mapping is a way to transfer and respond to the request between the various database architecture.

Mapping takes more time to transfer data in small DBMS.

External / Conceptual mapping transforms the data from the outer level to the conceptual schema.

In Conceptual / Internal mapping, response transforms from conceptual to internal level.

Document Schema Definition Language (DSDL) is a framework in which multiple validations can be applied to achieve a complete validation result. In this way, schema definition language support this architecture.

8 0
3 years ago
Other questions:
  • What feature of a word processing program helps you to easily check and correct spelling mistakes?
    9·1 answer
  • Write a function swap that swaps the first and last elements of a list argument. Sample output with input: 'all,good,things,must
    10·2 answers
  • You work for a company that builds custom PCs for select clients. You are training a new employee to evaluate and select appropr
    13·1 answer
  • The chief intellectual property officer (CIPO) is responsible for collecting, maintaining, and distributing the organization's k
    14·1 answer
  • A spreadsheet contains the maximum weight and maximum height for fifty dog breeds. The breeds are located in rows, and the weigh
    5·1 answer
  • List three social implications of the wider range of piracy​
    15·1 answer
  • What is difference between base font and font tags​
    13·1 answer
  • Consider the following code segments that are potential replacements for /* missing code */.
    6·1 answer
  • Explain why the operating system hides certain folders ​
    5·1 answer
  • SINCE I CANT SEE IT KANG LOOK
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!