Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Explain about Deadlock Avoidance?
To prevent deadlocks two kinds of techniques are used:
1) Static prevention: It employs P and V operators in addition to Semaphores to allocate and deallocate shared resources in multiprocessor. Semaphores are created based on sleep wait protocol. The portion of programme where a deadlock may occur is termed as critical section. Semaphores are like control signals used for avoiding collision between processes.
P and V technique of Deadlock prevention acquaintances a Boolean value 0 or 1 to every semaphore. Two atomic operators, P and V are used to access critical section symbolized by the semaphore. The P(s) operation makes value of semaphore is to be raised by one if s is already at non-zero value.
The V(s) operation raises value of s by one if it's not already one. The equation s=1 denotes availability of resource and s=0 denotes non-availability of resource.
At the time of execution different processes may submit their requests for resources asynchronously. The resources are assigned to different processors in such a manner that they don't create circular wait. The disadvantage of static prevention is poor resource utilisation.
2) One additional method of deadlock prevention is dynamic deadlock avoidance. It ensures deadlocks on runtime condition that may bring in heavy overhead in distinguishing potential existence of deadlocks.
Why WAP gateways are used? The Wireless Application Protocol Gateway is a very unique product giving semi -automatic redirection of HTML documents to WAP compatible mobile phon
What are delay systems in telecommunication networks? Delay System: A class of telecommunication networks like data a network that places the call or message arrivals in a qu
what is waterfall model
Why disable statements are not allowed in functions? If disble statement is used in function,it invalids function and its return value. So disable statements aren't
Q. Explain about Quine McKluskey Method? A tabular method was proposed to deal with increasing number of variables called Quine McKluskey Method. This method is appropriate for
Q. Explain SR Latch using NOR gates? Let's inspect the latch more closely. i. Suppose initially 1 is applied to S leaving R to 0 at this instance. The instant S=1 output o
Discuss the process of data mining? The process of data mining having of three stages: (1)The initial exploration (2) Model building or pattern identification with validat
One can use the event GET in a report without LDB attribute. False. no one can use the event GET in a report without attribute.
Explain in details the various standard I/O interfaces. The various standard I/O interfaces are: 1. The Peripheral component interconnect(PCI) bus is a standard that suppor
Define underflow and overflow. Underflow: If the result the arithmetic operation including n-bit numbers is too small to show by n-bits, underflow is said to occur. Overflow
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd