<h2>Dead lock is possible in Bank Transactions</h2>
Explanation:
Let us understand the term "Dead lock"
A deadlock is a situation where whole set of process is locked, since each of the process is waiting or holding the resource of another process. Each process will be interdependent and waiting for the same resource.
Deadlock is possible during bank transaction in the following situation:
A & B are two accounts where A tries to transfer funds to B and B tries to transfer fund to A.
When both tries to transfer funds at the same time, deadlock occurs.
A deadlock can be avoided by any one of the four methods.
They are: Mutual exclusion, No preemption, circular wait, hold and wait.
The truth is that you do not get to just make an account and post. He keeps it steady by having a highly trained group of people go through all the information and make sure it is correct before they let it be posted. They have not, however, changed things that were posted before those people started to work.
This is a TRUE statements
Answer:
Cloud Computing
Explanation:
Cloud Computing is basically an infrastructure to deliver various computing resources and services to the users online (via Internet). These resources include networks, applications, servers, databases, software, storage etc.
These services are mostly utilized by organizations for recovery and backup of data, using virtual hardware and other computing resources such as desktops, memory etc. Cloud computing is also used for developing software, for securing data by providing with access control and for storing bulk of data.
The benefits of cloud computing are as following:
Because of cloud computing the customers do not have to buy hardware or install software on their computer which might be very costly to maintain and update. Servers and data centers are provided by cloud service providers and experts are available for managing the services and resources.
These services are scalable and can be adjusted as per the users requirements.
Cloud computing offers a variety of protocols, tools, and access controls that improve security and protects confidential data, applications, and networks against security threats and attacks. It also provides with data backup, disaster recovery.
Answer:
Procurement
Explanation:
Characteristics hardware lifecycle:
- Procurement- Acquiring new IT hardware assets involves evaluating vendors, purchase orders, receiving, and device labeling.
- Deployment - Hardware configuration and installment, placing hardware and software assets into production environments.
- Maintenance & Support - Management of assets include scheduling scans and getting audit history.
- Upgrade - Before you retire your IT hardware assets, you’ll reach a processing plateau that can be restored with hardware upgrades.