1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ede4ka [16]
3 years ago
11

Fill in the missing step in the following deadlock situation. Two users from the local board of education are each running a pro

gram (P1 and P2), and both programs will eventually need two DVD drives to copy files from one disc to another. Only two DVD-R drives are available and they’re allocated on an "as requested" basis. Soon the following sequence transpires:______.1. P1 requests tape drive 1 and gets it.2. P1 requests tape drive 2 but it is blocked.3. P2 requests tape drive 1 but it is blocked. A. Pl requests drive 2. B. P2 requests drive 2 and gets it. C. P2 requests drive I but is blocked. D. Pl releases drive 1.
Computers and Technology
1 answer:
Softa [21]3 years ago
7 0

Answer:

b. P2 requests drive 2 and gets it.

Explanation:

Two users from the local board of education are each running a program (P1 and P2), and both programs will eventually need two DVD drives to copy files from one disc to another. Only two DVD-R drives are available and they’re allocated on an "as requested" basis. Soon the following sequence transpires: P2 requests drive 2 and gets it.

You might be interested in
The only requirement of __________ is that the sender must provide some mechanism whereby the receiver can opt out of future ema
fiasKO [112]

Answer:

The CAN-SPAM Act

Explanation:

Email or electronic mail is an information system mechanism of communication, that involves the use of digital devices to initiate communication over the internet. The email uses several protocols like the POP3, IMAP etc.

The CAN-SPAM Act is proposed in the United States law, applicable to email investigations. It requires that a sender provides a mechanism whereby the receiver can opt out of future emails without a fee.

4 0
3 years ago
What part of the code is a signal for the function to execute and pass back a value?
Trava [24]

Answer:

2

Explanation:

6 0
3 years ago
Read 2 more answers
Which formula is used to measure accuracy?
shepuryov [24]
<span>Gross WPM – Net WPM x 100
So B</span>
7 0
3 years ago
An example of what you can post that shows kindness to other
harina [27]

Answer:

everybody is awesome

Explanation:

5 0
3 years ago
Will give brainliest!!!!!!!!
dolphi86 [110]

Answer:

d the overall strength of colours

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • What type of Windows Server is the most likely server to be targeted by a computer hacker?
    13·2 answers
  • Ethan wants to change the font in his document. He should _____.
    8·2 answers
  • One type of technology that can verify a person's identity is _____.
    6·2 answers
  • Which topology enables only one person, at one time, to send data to others on the network?
    6·1 answer
  • )a___ is a complete binary tree such that each node in the tree contains a comparable object that us greater than or equal to th
    9·1 answer
  • Which are characteristics of an effective solution? Choose all that apply. solves the problem in anticipated ways each time resu
    5·1 answer
  • hello my friend is doing a give away at 100 followers would you follow him for a chance to win 2000 vbucks his name is ZoVa_Velo
    15·2 answers
  • Do you think communities or countries can survive without the internet?why or why not?​
    11·1 answer
  • At what layer in the TCP/IP protocol hierarchy could a firewall be placed to filter incoming traffic by means of:
    5·1 answer
  • Give a brief explanation about the internet.plsssss
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!