Chapter 7: Deadlocks.
a) What is deadlock?
b) Draw FOUR (4) symbols used in Resources-Allocation Graph as follows.
I ) Process
II) Resources Type with three instances
III) Pi requests instances of Rj
IV) Pi is holding an instances of Rj
Rujuk Nota (slide) berikut.
+ Security
c) A password may become known to other users in a variety of ways. Is there a simple method for detecting that such event has occurred? Explain your answer.
d) The list of all passwords is kept within the operating system. Thus, if a user manages to read this list, password protection is no longer provided. Suggest a scheme that will avoid this problem.
Subscribe to:
Post Comments (Atom)
Cara download Installer windows 10 dalam format ISO
1. Jika anda bercadang untuk download windows 10 melalui website rasmi windows - pilihan untuk download dalam format ISO tidak di berikan. ...
-
ANSWERS TO CHAPTER EXERCISES (CHAPTER 8) Review Questions 1. List and describe various types of output, including technolog...
-
Based on real life scenario on any local company/ organization which you are very familiar, define the problem that could be addressed thr...
-
A. Response to the following statements by circling either T (TRUE) or F (FALSE). [10M] I. 1. Java enables users...
No comments:
Post a Comment