Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Describe the necessary conditions for Deadlock.
Required conditions for deadlock
1. Mutual exclusion
2. Hold and wait
3. No preemption
4. Circular wait
Mutual exclusion: This condition must hold for non sharable resources. For illustration, a printer cannot be concurrently shared by several processes. Shared resources conversely, do not need mutually exclusive access, and therefore cannot be included in the deadlock. Generally, however this is not possible to prevent deadlocks through denying the mutual exclusion condition.
Hold and wait: To make sure that the hold and wait condition never arises in the system; we should guarantee that, whenever a process requests a resource, this does not hold any other resources. Processes may requests several resources and use them before such can request any other resources, as it should release all the resources that this is currently allocated.
No preemption: The third essential condition is that here is no preemption of resources which have already been allocated. If a process that is holding several resources requests other resource that this cannot be instantly allocated to this. Then all resources presently being held are preempted.
Circular Wait: One way to make sure that the circular wait condition never holds is to impose a total ordering of all resources kinds, and to make sure that each process requests resources in a rising order of enumeration.
Q. Describe Message Passing Model? In message-passing model there be a set of tasks which employ their own local memories at the time of computation. Many tasks may inhabit on
Explain the Quantization error of an ADC. Ans. Quantization error- An analog voltage is within the range of 0 to 1V and for 3 bit output, the size of all intervals are
Differentiate between intranet and internet Some comparisons between intranet and internet include: - INTERNET is INTERnational NETwork - An INTRANET is INTernal Restri
How many types of keys used to encrypt and decrypt data in Secure Sockets Layer? Two forms of keys are used as ciphers to decrypt and encrypt data. Private keys are referred to
Disadvantages of file processing system
Q.What is Canonical and Standard Forms? An algebraic expression can express in two forms: i) Sum of Products (SOP) for example (A . B¯) + (A¯ . B¯) ii) Produ
Update -task updates are Asynchronous updates.
Determine the approaches to organizing stored program control There are 2 approaches to organizing stored program control: 1. Centralized: In this control, all control equi
Q. What do you mean by Decoders? Decoder transforms one kind of coded information to other form. A decoder has n inputs and one enable line (sort of selection line) and 2 n ou
Find the minimum SOP and POS expression for the following functions using Karnaugh Map and realize the expression using appropriate gates. Also realize SOP form using NAND-to-NAND
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd