Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Explain about Deadlock Avoidance?
To prevent deadlocks two kinds of techniques are used:
1) Static prevention: It employs P and V operators in addition to Semaphores to allocate and deallocate shared resources in multiprocessor. Semaphores are created based on sleep wait protocol. The portion of programme where a deadlock may occur is termed as critical section. Semaphores are like control signals used for avoiding collision between processes.
P and V technique of Deadlock prevention acquaintances a Boolean value 0 or 1 to every semaphore. Two atomic operators, P and V are used to access critical section symbolized by the semaphore. The P(s) operation makes value of semaphore is to be raised by one if s is already at non-zero value.
The V(s) operation raises value of s by one if it's not already one. The equation s=1 denotes availability of resource and s=0 denotes non-availability of resource.
At the time of execution different processes may submit their requests for resources asynchronously. The resources are assigned to different processors in such a manner that they don't create circular wait. The disadvantage of static prevention is poor resource utilisation.
2) One additional method of deadlock prevention is dynamic deadlock avoidance. It ensures deadlocks on runtime condition that may bring in heavy overhead in distinguishing potential existence of deadlocks.
Public Key Infrastructure solutions The use of public-key based security systems requires great attention and due care in design and management of security features. The secur
Problem: (a) Accessibility can be classified as below: (i) Barrier-free design (ii) Web accessibility. Describe the importance of barrier free design and web accessibi
Q. Explain Bus Interface Unit? BIU (Bus Interface Unit) mainly interacts with system bus. It executes nearly all the activities relating to fetch cycle like: Computing
What is data mining? Data Mining: It is an analytic process designed to explore data and after that to validate the findings through applying the detected patterns to lat
Two computers using TDM take up turns to send 100-bytes packet over a shared channel that operates at 64000 bits per second. The hardware takes 100 microseconds after one computer
Explain MIB (Management Information Base) variables. MIB is a set of named items which an SNMP agent knows. To control or monitor a remote computer, a manager should fetch or s
Suppose you have to develop an error recovery protocol for a link that is unreliable and delay sensitive, which of the following protocol would you choose? (i) Stop & wait.
Which method do you invoke on the DataAdapter control to load your generated dataset with data? dataAdapter.Fill(ds). The beauty of this method is it automatically implicitly
How do you turn off cookies for one page in your site? Use the Cookie. Discard Property which Gets or sets the discard flag set by the server. When true, this property initiat
Q. Explain Indirect Cycle in control unit? Once an instruction is fetched the subsequent step is to fetch the operands. The instruction may have indirect and direct addressing
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd