1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ahat [919]
3 years ago
12

One condition for deadlocks is the circular-wait condition. One way to ensure that this condition never holds is to impose a tot

al ordering of all resource types and to require that each process requests resources in increasing order of enumeration. Given an example of a bank transaction, is deadlock possible for this case
Computers and Technology
2 answers:
Artyom0805 [142]3 years ago
4 0
<h2>Dead lock is possible in Bank Transactions</h2>

Explanation:

Let us understand the term "Dead lock"

A deadlock is a situation where whole set of process is locked, since each of the process is waiting or holding the resource of another process. Each process will be interdependent and waiting for the same resource.

Deadlock is possible during bank transaction in the following situation:

A & B are two accounts where A tries to transfer funds to B and B tries to transfer fund to A.

When both tries to transfer funds at the same time, deadlock occurs.

A deadlock can be avoided by any one of the four methods.

They are: Mutual exclusion, No preemption, circular wait, hold and wait.

ira [324]3 years ago
3 0

<u>A deadlock</u><u> refers to a situation in which two computer program that shares the same resource/data  are  preventing each other from accessing the resource/data , resulting in both programs ceasing to function.</u>

<u />

Explanation:

A deadlock refers to a situation in which  the whole  process is locked, since each of the process is waiting or holding the resource of another process. The two process are interdependent on each other and cannot function independently

<u>An example of Deadlock occurring  during a bank transaction is   </u>

<u />

Lets consider two bank accounts of customer X & Customer Y

Now if  customer X  tries to transfer funds to Customer Y or Y tries to transfer fund to X ,when these 2 process occur simultaneously at the same time a deadlock is said to have occur

You might be interested in
Add my sna-p dkarpik58?...
BARSIC [14]

<u><em>This is for answers not snap</em></u>

7 0
3 years ago
Text rotation is also called _________________.
strojnjashka [21]

Text rotation is also called B. Orientation, in which they change how the page is viewed, commonly portrait or landscape.

hope this helps

8 0
3 years ago
Given the following declaration, what is the value of b[ 1 ][ 0 ]? int b[ 2 ][ 2 ] = { { 1 }, { 3 , 4 } };
slavikrds [6]

Based on the declaration "int b[ 2 ][ 2 ] = { { 1 }, { 3 , 4 } };" given, the value of b[ 1 ][ 0 ] is equal to 3.

<h3>What is Python?</h3>

Python can be defined as a high-level programming language that is designed and developed to build websites and software applications, especially through the use of dynamic commands (semantics), declarations, functions, and data structures.

<h3>What is an int?</h3>

Int is an abbreviation for an integer and it can be defined as a whole number that may either be positive, negative, or zero.

Based on the declaration "int b[ 2 ][ 2 ] = { { 1 }, { 3 , 4 } };" given, we can infer and logically deduce that the value of b[ 1 ][ 0 ] is equal to 3.

Read more on Python integers here: brainly.com/question/18761825

#SPJ1

8 0
2 years ago
1. Name the first PC virus.<br> 2. In which language are viruses written for Microsoft programs?
Tju [1.3M]

Answer:

The first IBM PC virus in the "wild" was a boot sector virus dubbed (c)Brain, created in 1986 by Amjad Farooq Alvi and Basit Farooq Alvi in Lahore, Pakistan, reportedly to deter unauthorized copying of the software they had written. The first virus to specifically target Microsoft Windows, WinVir was discovered in April 1992, two years after the release of Windows 3.0.

Explanation:

HOPE THIS HELPS

6 0
3 years ago
Read 2 more answers
List safety conditions when downloading shareware, free free where, or public domain software
Anit [1.1K]

Answer:

Explanation:

Freeware and shareware programs are softwares which are either free of charge or consist of a free version for a certain trial period. These programs pose a threat of habouring malware or viruses which could damage one's computer and important files and programs. Therefore, it is imperative that carefulness is maintained when trying to get these softwares.

Some of the necessary safety conditions that should be taken include;

1) Appropriate research about the software including taking more about the vendors and reviews.

2.) Once, a healthy review has been identified ; the download can begin with the Downloader ensuring that the download is from the recommended site.

3) Prior to installation the software should be scanned with an active anti-virus program to determine if there is possibility that a virus has creeped in.

4.) Some softwares may require that computer anti-virus be turned off during installation, this is not always a good idea as this act leaves the system vulnerable a d badly exposed.

6 0
3 years ago
Other questions:
  • Consider a multiprocessor CPU scheduling policy. There are 2 options: 1) a singlecommon ready queue of jobs; when a CPU becomes
    8·1 answer
  • *FREE POINTS* If you comment and follow me this will give up lot of points :p seriously I will follow u back if u do it :p​
    11·2 answers
  • 2. What is the layout of the modern keyboard known as?
    13·1 answer
  • What was one of the first inventions that made it possible to communicate almost instantly?
    11·1 answer
  • Which of the following is not considered format?
    8·2 answers
  • Select the correct answer.
    15·1 answer
  • Which search engine do you prefer? Why
    15·2 answers
  • Question 21 pts How many lines should an email signature be? Group of answer choices "5 to 6" "7 to 8" "1 to 2" "3 to 4"
    10·1 answer
  • In 100 words or less, discuss why ethics is especially important for computer professionals, as it pertains to addressing profes
    5·1 answer
  • DEFINE Problem:
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!