1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erastova [34]
2 years ago
13

Given the three thread states: running, runnable (i.e., ready), and blocked (i.e., waiting), state which of the six possible thr

ead transitions are allowed, and which ones are not. Also, for each case, provide an example of how the transition occurs, or a reason why it cannot (as a justification for each of your answers). Assume Mesa-style scheduling.

Computers and Technology
1 answer:
galben [10]2 years ago
8 0

Answer:

Ready-Running

Running-Ready

Running-Blocked

Blocked-Ready

Ready-Blocked

Blocked-Running

Explanation:

In monitor synchronisation, one of the scheduling approaches is the Mesa style scheduling.

The Mesa style scheduling in a Mesa monitor, the released thread due to a signal is also in the inactive state. Note that those inactive threads had the lock previously; but, they are unable to re-acquire it.

There are six ways it can carry out scheduling, they are as shown in the answer.

Please kindly check attachment for details and drawing.

You might be interested in
What is the process for creating a new merge document for address labels?
Archy [21]

Answer:

In Word, click Mailings > Start Mail Merge > Step-by-Step Mail Merge Wizard to start the mail merge wizard. Choose Labels, and then click Next: Starting document. Choose Label options, select your label vendor and product number, and then click OK. Click Next: Select recipients.

Explanation:

6 0
3 years ago
Read 2 more answers
A developer wants to take existing code written by another person and add some features specific to their needs. Which of the fo
anzhelika [568]

Answer:

open-source

Explanation:

open-souce software allows any user to submit modifications of the source code

7 0
2 years ago
How can the connection to salesforce be restricted only to the employee portal server? Universal containers (UC) uses a legacy E
Ad libitum [116K]

Answer

To restrict the connection only to the employee portal server, the IP address of the application should be added into the list of Trusted IP's.

Explanation:

Trusted IP's are the IP's that are used to identify the users that can be verified easily. Those users whose IP's are not listed in the trusted IP list needs to verify their identity by sending them login code on each transaction.

<em>In above mentioned case, We need to enlist the IP address of employee portal list in trusted IP list to ensure the restriction of login to employee only.</em>

4 0
3 years ago
Write a program in c++ to read two integers, calculate and print the smallest
Shalnov [3]

Answer:

#include<iostream>

using namespace std;

int main (){

int n1, n2;

cout<<"Enter 1st number";

cin>>n1;

cout<<"Enter 2nd number";

cin>>n2;

if(n1<n2){

cout<<"The 1st number is the smallest"<<endl<<" is= "<<n1;

}

else{

cout<<"The 2nd number is the smallest"<<endl<<" is= "<<n2;

}

}

return 0;

3 0
3 years ago
Given a list of integers. find the size of the list
dlinn [17]

The size of a list of integers can be found using python as follows;

size = len(list1)

<h3>How to find the size of a list using python?</h3>

The size of a list can be found using the len() function in python.

According to the question, the list is an integer.

Therefore, let's use an example below:

list1 = [1, 2, 1, 3, 6, 7, 8, 9, 4, 7, 8, 6, 4]

size = len(list1)

print(size)

Therefore,  the size of a list of integers can be found using the len() function in python.

learn more on python here: brainly.com/question/14989942

#SPJ1

6 0
2 years ago
Other questions:
  • Write a program that simulates flipping a coin repeatedly and continues until three consecutive heads. are tossed. At that point
    6·1 answer
  • You are the system administrator for a medium-sized Active Directory domain. Currently, the environment supports many different
    7·1 answer
  • Written and artistic expressions are protected by
    8·1 answer
  • Which of the following takes place during the research phase
    7·1 answer
  • Write a (one) program for your microcontroller so that it:
    14·1 answer
  • The benefits for a cad proram is: (points : 2) 1 accuracy 2 repeatability 3 simplicity 4 all of the above
    9·1 answer
  • Which library research databases include information about articles published in magazines, journals, and newspapers? question 1
    7·1 answer
  • Part of preforming routine computer maintenance includes
    9·2 answers
  • The Mark Table of Contents Entry option is used for marking nonheading text for the table of contents. the options are manually
    5·2 answers
  • How much would it cost to get the screen replaced on a Moto G7?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!