Answer:
See explaination
Explanation:
The code
type printer = monitor
var P: array[0…2] of boolean;
X: condition;
procedure acquire (id: integer, printer-id: integer);
begin
if P[0] and P[1] and P[2] then X.wait(id)
if not P[0] then printer-id := 0;
else if not P[1] then printer-id := 1;
else printer-id := 2;
P[printer-id]:=true;
end;
procedure release (printer-id: integer)
begin
P[printer-id]:=false;
X.signal;
end;
begin
P[0] := P[1] := P[2] := false;
end ;
Note:
Monitors are implemented by using queues to keep track of the processes attempting to become active int he monitor. To be active, a monitor must obtain a lock to allow it to execute the monitor code. Processes that are blocked are put in a queue of processes waiting for an unblocking event to occur.
Answer:
How to convert binary to decimal ?
It consists of digits from 0 to 9. Binary to decimal conversion can be done in the simplest way by adding the products of each binary digit with its weight (which is of the form - binary digit × 2 raised to a power of the position of the digit) starting from the right-most digit which has a weight of 20.
what is digital and analogue?
In analog technology, a wave is recorded or used in its original form. So, for example, in an analog tape recorder, a signal is taken straight from the microphone and laid onto tape.In digital technology, the analog wave is sampled at some interval, and then turned into numbers that are stored in the digital device.
#include <iostream>
#include <vector>
std::vector<int> v;
int main(int argc, char* argv[]) {
while(1) {
int temp;
std::cout << "\nEnter a number: ";std::cin>>temp;
if(temp<0) {
std::cout << "\nEven number(s) is/are:\n---------------------\n";
for(int i=0;i<v.size();i++) {
if(v.at(i)%2==0) std::cout << v[i] << " ";
else continue;
}
std::cout << std::endl;
break;
}else {
v.push_back(temp);
}
}
return 0;
}
Answer: Distributing malicious flash drives in a parking lot or other high-traffic area, often with a label that will tempt the person who finds it into plugging it in, is a technique used by penetration testers.
Explanation:
design of the network
security for the network
documentation
identifying and fixing issues