Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Write a pseudo code to find sum of two functions?
Let's write a pseudo code to find sum of two functions f(A) + f(B). In first algorithm we will not use locking.
Process A Process B
sum = 0 :
: :
fork B sum = sum+ f(B)
sum = sum + f(A) end B
:
join B
end A
If process A executes statement sum = sum + f(A) in addition writes results in main memory followed by computation of sum by process B then we attain correct result however consider case when B executes statement sum = sum + f(B) before process A can write result in the main memory. Then sum comprises only f(B) that is incorrect. To avoid such variation we use locking.
: lock sum
fork B sum = sum + f(B)
: unlock sum
lock sum :
unlock sum
In this case every time a process obtains sum variable it locks it sothat no other process can access that particular variable that guarantees consistency in results.
Uniform Memory Access Model (UMA) In this model, the main memory is uniformly shared by all processors in multiprocessor systems and each processor has equal access time to sha
How can we declare a table control in the ABAP/4 program? Using the syntax controls type tableview using screen .
A field containing quantity amounts (data type QUAN) must be assigned to a reference table and a reference field. Explain? As a reference table, a system table having all the v
Define File record length ? File record length must be selected to match the data characteristics.
Define the Process of dynamic modelling: Analyse applicability of actions Recognize object states Create dynamic model diagram Express every state in terms o
Algorithm to insert a key in B-tree is as follows: 1. First search is completed for the place where the new record must be put. As the keys are inserted, they are sorted into
Classification according to part of instruction and data: According to the parts of instruction and data, following parts are identified under this classification: Scal
An SNMP integer whose value is 200 has to be transmitted. Show its representation in ASN.1 syntax. An ASN.1 transfer syntax describes how values of ASN.1 types are unambiguousl
Give some examples of malicious data. In May 2002 year, the Norton Anti-Virus software for Windows operating systems detected around 61000 malicious programs. Several of them a
Can you delete a domain, which is being used by data elements? No.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd