Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Discuss the different techniques with which a file can be shared among different users.
Several popular techniques with that a file can be shared among various users are:
1. Sequential sharing: In this technique of sharing, a file can be shared through only one program at a time, it is file accesses by P1 and P2 are spaced-out over time. A lock field can be utilized to implement it. Setting and re-setting of the lock at file open and close makes sure that only one program can utilize the file at any time.
2. Concurrent sharing: Some number of programs may share a file concurrently. While this is the case, this is essential to ignore mutual interference among the
m. There are three categories of concurrent sharing:
a. Immutable files: If a file is shared into immutable mode, no one of the sharing programs can modify it. Such mode has the advantage that sharing programs are independent of one more.
b. Single image immutable files: There the changes made by one program are instantly visible to other programs. The Unix file system utilizes this file- sharing mode.
c. Multiple image mutable files: There many programs can concurrently update the shared file. All updating program creates a latest version of the file that is different from the version created through concurrent programs. Such sharing mode can only be utilized in applications where the existence of multiple versions and concurrent updates are meaningful.
Q. Explain working of Digital Versatile Disk? With the capacious digital versatile disk (DVD) electronics industry has ultimately found an acceptable replacement for videotape
find area uder the curve y=f(x) between x=a and x=b Posted Date: 9/1/2012 1:50:09 AM
What do you understand by E-cash? E-Cash Ecash is a cash which is showed by two models. One is the on-line form of e-cash which permits for the completion of all types of
What are the disadvantages of Public Key Cryptography? Disadvantages of Public Key Cryptography are as given below: a) It is used to encrypt a secret key that is used to e
Q. Instruction Queue in Bus Interface Unit? Instruction queue is employed to store the instruction ‘bytes' fetched. Please conceren two points here: that it's (1) A Byte (2) Qu
In order to support IA-32 Itanium can switch in 32-bit mode with special jump escape instructions. IA-32 instructions have been mapped to Itanium's functional units. But as Itanium
Elements are given 3,14,7,1,8,5,11,17,,6,23,12,20,26,4,16,18,24,25,19 We will construct b tree and avl tree And after that delete some integers
Is there a way to apply the same formatting to every sheet in a workbook in Excel? Ans) Yes. To do this, you will require to right click on one of the worksheet tabs and th
The number of point to point links required in a fully connected network for 50 entities is? The number of point to point links needed in a completely connected network for 50
Compare single bus structure and multiple bus structure? A system that having only one bus(i.e only one transfer at a time) is known as a single bus structure. A system is know
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd