1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pie
3 years ago
8

What is the technique in which a process can do nothing until it gets permission to enter its critical section but continues to

execute an instruction or set of instructions that test the appropriate variable to gain entrance? A. Spin Waiting B. General Semaphore C. Critical Resource D. Message Passing
Computers and Technology
1 answer:
iVinArrow [24]3 years ago
7 0

Answer:  A)Spin Waiting

Explanation: Spin waiting is the mechanism to wait in a loop till the permission for the entering the critical sector is granted.The permission is granted on the basis of availability of the lock. The loop continues to wait by tending to be in busy waiting situation .

Other options are incorrect because general semaphore is used for solving critical issues and achieving synchronization, critical resource can be used at one time at one certain situation and message passing is used for communication of object by sending and receiving message.Thus, the correct option is option(A).

You might be interested in
If you want to remove the autocorrect options button from the screen, you can press the ____ key.
Luden [163]

Answer:

ESC

Explanation:

It allows the user to abort, cancel, or close an operation.

3 0
2 years ago
Guys, please help me asap (Photo Attached) !!!!!!! HELP 25pts!!!!
Nata [24]
The answer is the first number line.

30/150 = 1/5 = 20%
7 0
3 years ago
Read 2 more answers
If you could make another device "smart" and have
konstantin123 [22]

Answer:

I would 100% make myself a SmartToaster (Trademark Pending)

Explanation:

A simple explanation would be <em>I like toast</em>

7 0
3 years ago
How does a layered pattern make use of abstraction and encapsulation?
maxonik [38]

Answer and Explanation:

The ways in which a layered pattern make use of encapsulation and abstraction are as follows:

  • This framework lays its focus mainly on the bundling of related functionalities inside an application into different layer that are vertically stacked over one another.
  • Functionality in between each layer is related by common function or role.
  • Communication in between the layers is clear and exact and is coupled loosely.
  • Providing a layered structure to the application indirectly supports its maintainability and flexibility.

Encapsulation:

Since, features like data type, properties, methods or implementation while designing are not exposed at the boundary of the layer thus No assumptions are required for these features.

Abstraction:

The layered framework abstracts the entire system's view and provides adequate details for better understanding of the roles of each layer individually and the relation that exist between these layers.

7 0
3 years ago
Arrange the steps involved in natural language generation.
Firdavs [7]

Answer:

1. accessing content from some knowledge base.

2. picking words and connecting them to form sentences.

3. setting the tone and style of the sentence.

4. mapping the sentence plan into sentence structure.

Explanation:

Natural language generation can be defined as a part of artificial intelligence (AI) which typically involves developing responses by an AI in order to enable the computer engage in a useful conversation.

This ultimately implies that, the computer has to generate meaningful data (phrases and sentences) from the internal database.

Basically, the steps involved in natural language generation in a chronological order are listed below;

1. Text planning: accessing content from some knowledge base.

2. Picking words and connecting them to form sentences

3. Sentence planning: setting the tone and style of the sentence.

4. Text realization: mapping the sentence plan into sentence structure.

4 0
3 years ago
Other questions:
  • WHAT SHOULD YOU DO IF AN ONCOMING CAR AT NIGHT APPROACHES WITH ITS HIGH-BEAMS ON?
    6·1 answer
  • Can Microsoft Excel can use Headers and Footers, just like Microsoft Word
    9·1 answer
  • A forensic investigator at a crime lab is performing a forensic analysis of a hard drive that was brought in by state troopers.
    10·1 answer
  • Jenny is working on a laptop computer and notices that the computer is not running very fast. She looks and realizes that the la
    14·1 answer
  • An image that has been saved in Tagged Image File Format (or .TIF) is A. readable only by Windows personal computers. B. a recto
    6·1 answer
  • 8.Which of the following IC was used in third generation of computers?Immersive Reader
    13·1 answer
  • A desktop computer is a type of mobile device.<br><br> a. true<br> b. false
    5·1 answer
  • What is the best way to improve an online search?
    11·2 answers
  • 2. How much did John Jones have in his account on the first day of the
    5·1 answer
  • There are many potential risks associated with the internet. what do we call the distribution and access of illegal copies of di
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!