Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Write a pseudo code to find sum of two functions?
Let's write a pseudo code to find sum of two functions f(A) + f(B). In first algorithm we will not use locking.
Process A Process B
sum = 0 :
: :
fork B sum = sum+ f(B)
sum = sum + f(A) end B
:
join B
end A
If process A executes statement sum = sum + f(A) in addition writes results in main memory followed by computation of sum by process B then we attain correct result however consider case when B executes statement sum = sum + f(B) before process A can write result in the main memory. Then sum comprises only f(B) that is incorrect. To avoid such variation we use locking.
: lock sum
fork B sum = sum + f(B)
: unlock sum
lock sum :
unlock sum
In this case every time a process obtains sum variable it locks it sothat no other process can access that particular variable that guarantees consistency in results.
Q. Layers of Distributed System architecture? Layers of Distributed System architecture are: Presentation Layer is actual user interface. This layer receives input and
Write a program, using functions, that calculates the area and perimeter of a rectangle whose dimensions (Length & width) are given by a user.
What is the difference between field-group header and other field groups? The header field group is a particular field group for the sort criteria. The system automatically p
What are the advantages of electronic payment system? Advantages of the electronic payment system are illustrated below: This gives good security schemes. Four important sec
Q. Explain Automated and Manual systems? Automated and Manual systems: The system that doesn't need human intervention is known as'Automated system'. In this system whole proce
What are the important tools of a three-tier client server? In a three-tier or multi-tier environment, there the client implements the presentation logic or the client. The bus
algorithm for deleteing a node
What are the security aspects of SIP Visualizer
When the user is inputting commands into your shell, it should properly handle delete and backspace. When one of these characters is detected, you will need to remove one character
Question: 1. Distinguish between HTTP and True streaming, stating the advantages and disadvantages of both type of media streaming. 2. Name two online services which provi
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd