Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Write a pseudo code to find sum of two functions?
Let's write a pseudo code to find sum of two functions f(A) + f(B). In first algorithm we will not use locking.
Process A Process B
sum = 0 :
: :
fork B sum = sum+ f(B)
sum = sum + f(A) end B
:
join B
end A
If process A executes statement sum = sum + f(A) in addition writes results in main memory followed by computation of sum by process B then we attain correct result however consider case when B executes statement sum = sum + f(B) before process A can write result in the main memory. Then sum comprises only f(B) that is incorrect. To avoid such variation we use locking.
: lock sum
fork B sum = sum + f(B)
: unlock sum
lock sum :
unlock sum
In this case every time a process obtains sum variable it locks it sothat no other process can access that particular variable that guarantees consistency in results.
What is the use of the statement Leave to List-processing? Leave to List-processing statement is used to make a list from a module pool. Leave to list processing statement per
Q. Show the Classification of Printers? Printers can be classified on following bases: a) Impact: Impact printers print by impact of hammers on ribbon (for example Dot-Matri
The output of a JK flipflop with asynchronous preset and clear inputs is '1'. The output can be changed to '0' with which conditions ? Ans. Through applying J = 1, K = 1 and u
Driver software is software that works as a translator among another program and some piece of hardware. In the software industry, there are commonly standard ways to do things. Th
Describe what happens when recursion functions are declared inline? Ans) Inline functions property says whenever it will call; it will copy the whole definition of that functi
Explain briefly Loop-invariant code motion of the commonly used code optimization techniques. Loop-invariant code motion If a quantity is calculated inside a loop duri
Identify the different classes of grammar. Explain their characteristics and limitations. As proposed through Noam Chomsky that Chomsky hierarchy contains the subsequent level
State the implementation of a security policy The implementation of a security policy should invariably cover all parameters of security such as physical access to the server,
To sktech the circles in the visualization, you need to use the paramteric equation of a circle (x = r cos (Θ), y = r sin(Θ). A circle can be shown as a polygon where the points of
An event handler is a part of a computer program formed to tell the program how to act in response to a definite event.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd