1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
never [62]
3 years ago
14

Two threads try to acquire the same resource at the same time and both are blocked. Then, they continually change their states i

n the same way and are continuously blocked. This condition is called
Computers and Technology
1 answer:
maksim [4K]3 years ago
7 0

Answer:

livelock.

Explanation:

"Two threads try to acquire the same resource at the same time and both are blocked. Then, they continually change their states in the same way and are continuously blocked. This condition is called" LIVELOCK.

The term ''livelock" in is a very good and a very important in aspect that is related to computing. LIVELOCK simply means a lock in which the process in denied multiple times. A perfect example is;

When a person A and a person meet on a very narrow path. Both person A and Person B will want to shift to a position which will allow each of them to pass(This are the processes Person A and B wants to take), so if the two now move to the same exact position instead of moving in an opposite direction then, we will say that we have a LIVELOCK.

You might be interested in
The author of ""Cyber-psychopathy: What Goes On in a Hacker’s Head"" claims that the act of hacking is a deep-seated psychologic
lisov135 [29]

Answer:

Explanation:

Based on the information provided within the question it can be said that the text that supports this is that in the book it states that this disorder is due to an obvious "addiction" to the sheer thrill of hacking, born of having found ways around the supposed ingenuity of "invulnerable" cyber security defences.

5 0
3 years ago
Read 2 more answers
Write a program using integers user_num and x as input, and output user_num divided by x three times.Ex: If the input is:20002Th
HACTEHA [7]

Answer:

Following are the code to the given question:

user_num = int(input())#defining a variable user_num that takes input from user-end

x = int(input())#defining a variable x that takes input from user-end

for j in range(3):#defining for loop that divides the value three times

   user_num = user_num // x#dividing the value and store integer part

   print(user_num)#print value

Output:

2000

2

1000

500

250

Explanation:

In the above-given program code two-variable "user_num and x" is declared that inputs the value from the user-end and define a for loop that uses the "j" variable with the range method.

In the loop, it divides the "user_num" value with the "x" value and holds the integer part in the "user_num" variable, and prints its value.  

5 0
2 years ago
Write a while loop that prints 1 to user_num. Sample output for the given program: 1 2 3 4
Scorpion4ik [409]
Given 1234
i=1
user num=4#assume positive
while (user-num>=i);
print(i)
i+=1
#include <iostream>
using namespace std;
int main()
{int userNum=0;
int i=0;
userNum=4; ##assume positive
i=1;
while (i <=userNum){
cout<<i>>" ";
i=i+1;
cout <<endl;
return0;
}
6 0
3 years ago
Read 2 more answers
There are four ways to create a macro? FALSE OR TRUE
Murljashka [212]

Answer: True

Explanation:

There are actually four ways to create a macro. You would want to use %let.

7 0
2 years ago
Read 2 more answers
An administrator needs to protect rive websites with SSL certificates Three of the websites have different domain names, and two
Marysya12 [62]

Answer:

Option A (One SAN certificate) is the right answer.

Explanation:

  • A vulnerability management certificate that permits many domain identities to be safeguarded by such a singular or unique certification, is considered a SAN certificate.
  • Though on the verge of replacing common as well as accepted security credentials with either of these de-facto certifications.

Other alternatives are not connected to the given scenario. Thus the above option is correct.

5 0
2 years ago
Other questions:
  • TRUE/FALSE: In order to use an object in a program, its class must be defined.
    10·1 answer
  • Write a loop that reads positive integers from standard input and that terminates when it reads an integer that is not positive.
    10·1 answer
  • The programs that provide the infrastructure and hardware control necessary for the computer and its peripheral devices are call
    11·1 answer
  • When you notice a safety hazard, what should your first step be?
    12·1 answer
  • A0domain indicates that the computer or DNS name does not exist.
    7·1 answer
  • Write a Java program that reads an 8-bit binary number from the keyboard as a string and then converts it into decimal. For exam
    11·1 answer
  • Which of the following is NOT an example of soft skill?
    8·1 answer
  • How many people are in Siver, on the game Valorant?
    14·1 answer
  • Which of the following shows the assignment of a string to a variable? Select 3 options.
    11·2 answers
  • What is the output for this program?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!