Chapter 7: Deadlocks.
a) What is deadlock?
b) Draw FOUR (4) symbols used in Resources-Allocation Graph as follows.
I ) Process
II) Resources Type with three instances
III) Pi requests instances of Rj
IV) Pi is holding an instances of Rj
Rujuk Nota (slide) berikut.
+ Security
c) A password may become known to other users in a variety of ways. Is there a simple method for detecting that such event has occurred? Explain your answer.
d) The list of all passwords is kept within the operating system. Thus, if a user manages to read this list, password protection is no longer provided. Suggest a scheme that will avoid this problem.
No comments:
Post a Comment