Will the idea work if three or more processes use semaphore

Assignment Help Operating System
Reference no: EM13869490

The Nevercrash Operating System Company has been receiving complaints from some of its customers about its latest release, which includes semaphore operations. They feel it is immoral for processes to block (they call it ‘‘sleeping on the job''). Since it is company policy to give the customers what they want, it has been proposed to add a third operation, peek, to supplement up and down. peek simply examines the sema- phore without changing it or blocking the process. In this way, programs that feel it is immoral to block can first inspect the semaphore to see if it is safe to do a down. Will this idea work if three or more processes use the semaphore? If two processes use the semaphore?

Reference no: EM13869490

Questions Cloud

Does the method work if there is a single cpu switches : Does this method work if There is a single CPU that switches between processes every 100 msec and Two CPUs share a common memory in which the semaphore is located?
What advantage is gained by using queue for waiting process : What advantage is gained by using a queue for waiting processes as opposed to waking a random sleeping processes when an up is performed?
What are the potential long-term consequences for rosie : Which of the four most common roles in family systems do you think Rosie is taking on? What are the potential long-term consequences for Rosie in taking on these heavy responsibilities
Gunpowder corp.''s board of directors approved a : On November 6, 2009, Gunpowder Corp.'s board of directors approved a share option plan for key executives. On January 2, 2010, a specific number of share options were granted.
Will the idea work if three or more processes use semaphore : In this way, programs that feel it is immoral to block can first inspect the semaphore to see if it is safe to do a down. Will this idea work if three or more processes use the semaphore? If two processes use the semaphore?
Identify which boundary is best described by each family : Identify which boundary is best described by each family in the scenario above. Identify which boundary inadequacies are present in each family, if applicable. Explain how each boundary and boundary inadequacy manifests itself
How is a substance use disorder diagnosed : What category of substances do cocaine and amphetamine fall under, and what are the implications of this category on the body? Be sure to give the classification, DEA schedule, and physical effects. How is a substance use disorder diagnosed
Write lock and unlock in assembly language : If all processes lock the semaphore table before using it, only one process at a time can fiddle with the variables and pointers, thus preventing races. Write lock and unlock in assembly language.
What management organization and technology issues : What management, organization, and technology issues were addressed in building Wine.com's Web site?

Reviews

Write a Review

Operating System Questions & Answers

  Standards in the field of wireless networking

Do you consider that standards are beneficial in the field of wireless networking or do you feel they limit new technologies?

  How could you copy all the files from the current directory

How could you move all the files that end with an extension *.h in your home directory to the current directory without knowing the full path to the current directory [Hint: use a shortcut for the home directory and current directory.

  Server program act as a memory manager

The server should print the client number, the logical address, the frame number, the physical address and a representation of the physical memory.

  Ethernet or token ring protocol

Saguaro Federal has mainframes for all of its banks and businesses. Should the corporations use the Ethernet or Token Ring protocol? Describe your choice. Discuss why is this choice appropriate?

  Television clips in a powerpoint presentation

Computers and television would work is when you tape television demonstrate that can be used to give flavor to PowerPoint Presentations.

  Single machine with total capacity

Suppose that there is a single machine with total capacity of 23 units of time, and that one gets partial credit for partially processing a task, so that processing a task of value Vi for time t

  Specify the order in which processes execute

Specify the order in which processes execute and determine the mean process turnaround time for each of the scheduling algorithms.

  Operating system provides a mechanism for configuring

Operating system provides a mechanism for configuring the behavior of the keyboard attached to the computer. Outline the behavior of the following sets of keys after they have been configured correctly

  When using handheld devices it is not the same as on a

when using handheld devices it is not the same as on a computer. describe the similarities and differences in the

  1 what factors affect storage speed2 what features should

1. what factors affect storage speed?2. what features should you look for in a printer? describe at least four in

  Computer privacy related question

One of the main concerns with the expanding influence of information technology is issue of personal privacy. As more and more individuals and businesses are using computers to transact business and store data the protection of individual privacy is ..

  Compare and contrast the two varieties of distribute os

Compare and contrast the two varieties of distrubted operating systems discussed in this chapter: a process-based DO/S and an object-based DO/S.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd