1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bearhunter [10]
3 years ago
7

Illustrate that the system is in a safe state by demonstrating an order in which the threads may complete.If a request from thre

ad T4 arrives for (2, 2, 2, 4), can the request be granted immediately?If a request from thread T2 arrives for (0, 1, 1, 0), can the request be granted immediately?If a request from thread T3 arrives for (2, 2, 1, 2), can the request be granted immediately?
Computers and Technology
1 answer:
Kamila [148]3 years ago
5 0

Answer:

a. safe sequence is T2 , T3, T0, T1, T4.

b. As request(T4) = Available, so the request can be granted immediately

c. As request(T2) < Available, so the request can be granted immediately

d. As request(T3) < Available, so the request can be granted immediately.

Explanation:

It will require matrix

[i, j] = Max [i, j] – Allocation [i, j]

A B C D

T0 3 3 3 2

T1 2 1 3 0

T2 0 1 2 0

T3 2 2 2 2

T4 3 4 5 4

Available = (2 2 2 4)

1. Need(T2) < Available so, T2 can take all resources

Available = (2 2 2 4) + (2 4 1 3) (Allocation of T2) = (4 6 3 7)

2. Need(T3)<Available so, T3 will go next

Available = (4 6 3 7) + (4 1 1 0) = (8 7 4 7)

Like wise next T0, T1, T4 will get resources.

So safe sequence is T2 , T3, T0, T1, T4.

(Note, there may be more than one safe sequence).

Solution b.

Request from T4 is (2 2 2 4) and Available is (2 2 2 4)

As request(T4) = Available, so the request can be granted immediately.

Solution c.

Request from T2 is (0 1 1 0) and Available is (2 2 2 4)

As request(T2) < Available, so the request can be granted immediately.

Solution d.

Request from T3 is (2 2 1 2) and Available is (2 2 2 4)

As request(T3) < Available, so the request can be granted immediately.

You might be interested in
Gloria is in her sophomore year of college and works part time. She has assignments saved on her home computer, her aunt's lapto
Tanzania [10]
I think this answer, "<span>Upload all existing documents to a cloud-based program," is correct. Hope I helped!!</span>
4 0
3 years ago
Read 2 more answers
Between which zones and a DMZ should firewalls be placed? Choose two answers.
brilliants [131]

Answer:

Internal and External Zones

Explanation:

Demilitarized Zone (DMZ) in a network means that, we make sure the security of network at higher level as military make sure the security of their bases or zones.

In this type of network, The network of the internal organization (LAN) needs security from hackers and unauthorized users who are trying to access the resources and information from the network.

This network is divided into two major zones. A DMZ has been placed between two zones along with firewalls enhance the security of LAN Network from the networks on internet. These two zones are named as Internal and External Zone. The firewall between DMZ and External zones monitors the users from external networks on the internet who tries to access organization's network. Internal network monitors the traffic between DMZ and Internal LAN network.

4 0
4 years ago
PARTNERING AS IT RELATES TO BPR.​
balandron [24]

Answer:

The answer to this question can be defined as follows:

Explanation:

The term BPR stands for "business processes reengineering", It is the recreating of the core business process to improve product performance or reliability or lower costs.

  • It generally includes analyzing business processes, which identifying sub-par or ineffective processes but identifying ways to dispose of or change it.
  • IT important for improving changes, especially to shift in aspects of the work, its incorporation in business operations, or competitive strength change.
  • It might contribute to making reconfiguration improvements, and is known as a BPR enabler.
6 0
4 years ago
What are the means of hardware security?​
sdas [7]

Answer:

Hardware security is vulnerability protection that comes in the form of a physical device rather than software that is installed on the hardware of a computer system. ... Common examples include hardware firewalls and proxy servers.

Explanation:

Thank you

5 0
2 years ago
Read 2 more answers
Regarding computer protection, quarantining is defined as ________. Select one: A. placing a found virus in a secure area on the
MatroZZZ [7]

Answer:

A. placing a found virus in a secure area on the hard drive

Explanation:

When a file is defected in a computer, quarantining is applied to prevent other parts of the computer. The infected file is isolated and if you let your antivirus software, it can delete the infected file.

3 0
3 years ago
Other questions:
  • A _________ is a series of commands and instructions that you group together as a single command to accomplish a task automatica
    15·1 answer
  • 12. Noodle Tools is a website that
    8·1 answer
  • A user deletes a message from a mailbox while on a desktop. What happens to the email message on the user's synchronized devices
    13·2 answers
  • Why are cable networks such as mtv and cnn more profitable than the big four broadcast networks?
    8·1 answer
  • Which date formats are allowed in Excel for February 14, 2018? Check all that apply.
    15·2 answers
  • Consider the following constructor for an immutable matrix ADT:
    8·1 answer
  • Blind spots are those areas not reflected in your:
    7·2 answers
  • I need some asap pls
    9·2 answers
  • What is the family access code right now?
    5·1 answer
  • You are purchasing a new printer. Which of the following is the most important requirement?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!