1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ahat [919]
3 years ago
12

One condition for deadlocks is the circular-wait condition. One way to ensure that this condition never holds is to impose a tot

al ordering of all resource types and to require that each process requests resources in increasing order of enumeration. Given an example of a bank transaction, is deadlock possible for this case
Computers and Technology
2 answers:
Artyom0805 [142]3 years ago
4 0
<h2>Dead lock is possible in Bank Transactions</h2>

Explanation:

Let us understand the term "Dead lock"

A deadlock is a situation where whole set of process is locked, since each of the process is waiting or holding the resource of another process. Each process will be interdependent and waiting for the same resource.

Deadlock is possible during bank transaction in the following situation:

A & B are two accounts where A tries to transfer funds to B and B tries to transfer fund to A.

When both tries to transfer funds at the same time, deadlock occurs.

A deadlock can be avoided by any one of the four methods.

They are: Mutual exclusion, No preemption, circular wait, hold and wait.

ira [324]3 years ago
3 0

<u>A deadlock</u><u> refers to a situation in which two computer program that shares the same resource/data  are  preventing each other from accessing the resource/data , resulting in both programs ceasing to function.</u>

<u />

Explanation:

A deadlock refers to a situation in which  the whole  process is locked, since each of the process is waiting or holding the resource of another process. The two process are interdependent on each other and cannot function independently

<u>An example of Deadlock occurring  during a bank transaction is   </u>

<u />

Lets consider two bank accounts of customer X & Customer Y

Now if  customer X  tries to transfer funds to Customer Y or Y tries to transfer fund to X ,when these 2 process occur simultaneously at the same time a deadlock is said to have occur

You might be interested in
Which of the following is NOT a common grammar adjustment which is identified by grammar-check software?
Sedbober [7]

Answer:

Shortened versions of phrases Ex:(l ol, s mh, i dk, ect.)

Explanation:

Hope that this helps, if you have any more question please feel free to contact me, hope you have an amazing rest of your day. ;D

7 0
2 years ago
Microsoft word's spelling checker will offer suggestions on misspelled words.<br> True)<br> False)
Rasek [7]
This is true. I hope I was helpful!
7 0
3 years ago
Read 2 more answers
Students who understand what the teacher is saying do not need to take notes.
padilas [110]
Trueeeeeeeeeeeeeeeeee
6 0
3 years ago
Read 2 more answers
How do you clear space in your iCloud?
Oxana [17]
Reset your settings and all storage by using your computer or device filter
6 0
3 years ago
Help please<br> helpp im begging
NemiM [27]
I think That it is A
6 0
2 years ago
Other questions:
  • (GAME DESIGN)
    15·1 answer
  • Help ASAP
    5·2 answers
  • In a case where electrical current leakage from the circuit occurs, the GFCI would do the following:
    10·1 answer
  • Site won't let me log in and is glitching? Is rainly down?
    15·2 answers
  • Which options are available when a user modifies a recurring appointment? Check all that apply. Open this occurrence Open the fi
    12·2 answers
  • What type of engineer is interested in designing, developing, and building different machines, devices, and tools? A.aerospace
    8·2 answers
  • How do media and networks interact? A. Networks and media work in exactly the same way. B. Media are connected to networks that
    8·1 answer
  • ______ is a customer-facing CRM application.<br><br> FAQ<br><br> Search<br><br> SFA<br><br> E-mail
    6·1 answer
  • An attacker has obtained the logon credentials for a regular user on your network. Which type of security threat exists if this
    9·1 answer
  • How to enhance the video to full screen in filmora
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!