1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ede4ka [16]
3 years ago
11

Fill in the missing step in the following deadlock situation. Two users from the local board of education are each running a pro

gram (P1 and P2), and both programs will eventually need two DVD drives to copy files from one disc to another. Only two DVD-R drives are available and they’re allocated on an "as requested" basis. Soon the following sequence transpires:______.1. P1 requests tape drive 1 and gets it.2. P1 requests tape drive 2 but it is blocked.3. P2 requests tape drive 1 but it is blocked. A. Pl requests drive 2. B. P2 requests drive 2 and gets it. C. P2 requests drive I but is blocked. D. Pl releases drive 1.
Computers and Technology
1 answer:
Softa [21]3 years ago
7 0

Answer:

b. P2 requests drive 2 and gets it.

Explanation:

Two users from the local board of education are each running a program (P1 and P2), and both programs will eventually need two DVD drives to copy files from one disc to another. Only two DVD-R drives are available and they’re allocated on an "as requested" basis. Soon the following sequence transpires: P2 requests drive 2 and gets it.

You might be interested in
A. When executing System.out.println(a1), the toString() method in the Object class is invoked.
Zina [86]

This question is incomplete, it lacks a piece of code to analyze.

I think you wanted an answer to the following question:

Analyze the following code:

public class Test {

   public static void main(String[] args) {

       Object a1 = new A();

       Object a2 = new Object();

       System.out.println(a1);

       System.out.println(a2);

   }

}

class A {

   int x;

   @Override

   public String toString() {

       return "A's x is " + x;

   }

}

A. When executing System.out.println(a1), the toString() method in the Object class is invoked.

B. When executing System.out.println(a2), the toString() method in the Object class is invoked

C. When executing System.out.println(a1), the toString() method in the A class is invoked.

D. The program cannot be compiled, because System.out.println(a1) is wrong and it should be replaced by System.out.println(a1.toString())

E. Both B and C.

Answer:

E. Both B and C.

Explanation:

<em>toString()</em> method is used to get the representation of this object as a string. When trying to display a string representation of an object usually the full name of the class will be displayed.

In the example above, line

<em>System.out.println(a2);</em>

would display something like

<em>[email protected]</em>

Obtained value can hardly serve as a good string description of an object. Therefore, <em>toString()</em> method is often overridden using <em>@Override</em> annotation (more info about <em>@Override</em> at https://beginnersbook.com/2014/07/override-annotation-in-java/)

Line  

<em>System.out.println(a1);</em>

would display <em>"A's x is 0" </em>because it uses <em>toString()</em> method overridden in class <em>A</em>.

6 0
3 years ago
. List 5 types of exploits from cybercrime and provide brief definition. (2.5 Marks)
Flura [38]

In cyber security, an exploit is a way attackers take advantage of certain vulnerabilities and gain malicious access to systems. There are very many types of exploits that exist in the cyber security world. However, I will mention those ones most commonly used.

DoS attacks – The denial of service attacks is very common. Hackers will gain access to servers and send so many packet requests at the same time. The servers become overwhelmed due to too much memory allocation and the huge amount of traffic ends up crashing the servers.

Unauthorized access – When an attacker has an illegal access to host machines

<u>Application Exploitation</u>

Code injection – This exploit can be used to maliciously inject invalid code into an application program or software and as a result change how the program behaves.

Cross-site scripting – Enable hackers inject malicious scripts on a website of a client. Once they have gained access, they will escalate their privileges and have more access to the site.

Clickjacking – A type of attack that tricks unknown victims into clicking links of a web page they believe are legitimate and end up revealing confidential information of themselves.

6 0
3 years ago
Can web sites contain copyright material? <br> Yes <br> No
Maru [420]
Yes they can contain copyright
6 0
3 years ago
Read 2 more answers
Which is an example of artificial intelligence in computers? A. multimedia software B. encryption software C. voice recognition
andrezito [222]

Answer:

its option b encryption software

Explanation:

Artificial intelligence (AI) is intelligence demonstrated by machines, unlike the natural intelligence displayed by humans and animals, which involves consciousness and emotionality. The distinction between the former and the latter categories is often revealed by the acronym chosen. 'Strong' AI is usually labelled as AGI (Artificial General Intelligence) while attempts to emulate 'natural' intelligence have been called ABI (Artificial Biological Intelligence). Leading AI textbooks define the field as the study of "intelligent agents": any device that perceives its environment and takes actions that maximize its chance of successfully achieving its goals.[3] Colloquially, the term "artificial intelligence" is often used to describe machines (or computers) that mimic "cognitive" functions that humans associate with the human mind, such as "learning" and "problem solving".

3 0
2 years ago
You want to securely erase data from your hard drive what can you use to do this and what is the process called
tankabanditka [31]
You could Factory Reset a computer or you could smash it with  a hammer
7 0
3 years ago
Read 2 more answers
Other questions:
  • What is used for World Wide Web?
    7·1 answer
  • Name three types of data stored on a computer’s hard disk
    11·1 answer
  • when two pieces of cui or other unclassified information are posted online together or attached together in an email and result
    5·1 answer
  • Write a function to output an array of ints on a single line. Funtion Should take an array and an array length and return a void
    9·1 answer
  • Ujqwgydft frrhyy4e uvbw vhrwbhv vbyrewblv?
    14·1 answer
  • Given that Apache and Internet Information Services (IIS) are the two most popular web application servers for Linux and Microso
    10·1 answer
  • Sally types documents that have a few numbers but mostly letters. To enter these numbers, she should use the
    12·1 answer
  • Explain the working principal of computer system with suitable diagarm​
    10·2 answers
  • What is geolocation?
    8·1 answer
  • Which of the following is true about named ranges?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!