1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gtnhenbr [62]
3 years ago
15

The Sleeping-Barber Problem:

Computers and Technology
1 answer:
s2008m [1.1K]3 years ago
6 0

Answer:

Explanation:

Following are the Semaphores:

Customers: Counts waiting customers;

Barbers: Number of idle barbers (0 or 1)

mutex: Used for mutual exclusion.

Cutting: Ensures that the barber won’t cut another customer’s hair before the previous customer leaves

Shared data variable:

count_cust: Counts waiting customers. ------------copy of customers. As value of semaphores can’t access directly.

// shared data

semaphore customers = 0; semaphore barbers = 0; semaphore cutting = 0; semaphore mutex = 1;

int count_cust= 0;

void barber() {

while(true) { //shop is always open

wait(customers); //sleep when there are no waiting customers

wait(mutex); //mutex for accessing customers1

count_cust= count_cust-1; //customer left

signal(barbers);

signal(mutex);

cut_hair();

}

}

void customer() {

wait(mutex); //mutex for accessing count_cust

if (count_cust< n) {

count_cust= count_cust+1; //new customer

signal(customers); signal(mutex);

wait(barbers); //wait for available barbers get_haircut();

}

else { //do nothing (leave) when all chairs are used. signal(mutex);

}

}

cut_hair(){ waiting(cutting);

}

get_haircut(){

get hair cut for some time; signal(cutting);

}

You might be interested in
Given two lists: L1=[10,12,14] and L2=[20,22,24] 2
OleMash [197]

Answer:

Explanation:

(i) L1+L2  Error:

L1=[10,12,14]  

L2=[20,22,24]       # {n. 2 delete}

L1+L2  

ans =

   30    34    38

(ii) L1*2

ans =

 20    24    28

(iii) L1

L1 =

  10    12    14

8 0
3 years ago
A user gets an ip address of 192.168.0.1 from the company network administrator. a friend of the user at a different company get
meriva
<span>Both computers are seen as having the same IP address externally. Your router will relay requests to the originating computer and the procedure used for this is Network address translation. However, if you were to try to communicating with your father's computer, you would use your internal addresses</span>
7 0
3 years ago
This is on zyBooks. Please write the code in C++, please!
poizon [28]

The program is an illustration of built-in functions

<h3>What are built-in functions?</h3>

They are named program statements that have a predefined purpose

<h3>The actual program</h3>

The program written in C++, where comments are used where required is as follows:

#include <iostream>

#include <cmath>

#include <ios>

#include <iomanip>

using namespace std;

int main (){

double x;

double y;

double z;

cin>>x;

cin>>y;

//This calculates the given expression

z = pow(sqrt(y),x);

cout << fixed<<setprecision(2);

cout<<z<<endl;

return 0;

}

Read more about python functions at:

brainly.com/question/14284563

7 0
2 years ago
Surprisingly, many of us may be unknowing victims of botnets. Because of the rising sophistication of botnet schemes, your compu
Virty [35]

Answer:

a. Simple rules

1. Upgrade your operating system

2. Upgrade your softwares regularly

3. Upgrade your browser when new additions are available

4. Change your password very often

b. Suspensious signs

1. The operating system and programs take a longer while to start up.

2. It shows lack of storage space despite having space

3. The PC crashes regularly

4. If the sent mails are received as spam

5. The hard disk is working excessively while no programs are currently running

C. All the part of a security incident should be logged.

Explanation:

a. Simple rules

1. Upgrade your operating system

2. Upgrade your softwares regularly

3. Upgrade your browser when new additions are available

4. Change your password very often

b. Suspensious signs

1. The operating system and programs take a longer while to start up.

2. It shows lack of storage space despite having space

3. The PC crashes regularly

4. If the sent mails are received as spam

5. The hard disk is working excessively while no programs are currently running

Explanation:

C. All the part of a security incident should be logged.

7 0
3 years ago
Different between anlog and digital computer?​
sp2606 [1]

Explanation:

Analog computer:

It works with naturaland physical values

It works upon continuous data.

Its accuracy is low.

Digital computer:

It works with digits.

It works upon discrete data.

Its accuracy is high

3 0
3 years ago
Other questions:
  • What should you do if your computer keeps shutting down while working?
    9·2 answers
  • 1. In which generation were semiconductor memories used for the first time:
    7·1 answer
  • Does anyone have the GCSE 2018 Design Technology J310/01 practice paper?
    15·1 answer
  • Any part of the computer that you can touch is called ________.
    6·1 answer
  • Why is printer an output device​
    14·2 answers
  • What symbol is used for an assignment statement in a flowchart?
    8·1 answer
  • Is the app scener safe? its a chrome webstore app on computer.​
    13·1 answer
  • Do you think it’s better for a young designer to use free, open-source art programs or to pay for commercial programs? Explain y
    14·1 answer
  • Type the numbers 1-50 and then type Computers and Technology twice type it once forward and once backwards.
    5·2 answers
  • the 4gl languages that enable nonprogrammers to use certain easily understood commands to search and generate reports from a dat
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!