The text has stated repeatedly that no assumptions should be made about the relative speeds of asynchronous concurrent threads. Why?

What will be an ideal response?


This is a crucial point. Students who look at two threads that perform similar or even identical operations expect the threads to execute at about the same relative speeds. But there literally is chaos in the computing system with perhaps dozens of threads competing for the processors and devices, with a “blizzard” of interrupts being directed at the processors (and thus disrupting the flow of threads), with devices malfunctioning, with interactive users taking different amounts of time to respond to system prompts and so on. Trivially, a perfectly respectable and well-behaved thread could repeatedly be interrupted almost every time it starts to run as I/O completions come in from other threads. Thus, concurrent pro- grams should be designed to operate correctly without building in any dependencies on the relative speeds of asynchronous concurrent threads.

Computer Science & Information Technology

You might also like to view...

You want to specify a spot color in an Adobe Illustrator or Adobe Photoshop document. You also want to use the same color in InDesign. What do you need to ensure to make this print correctly?

What will be an ideal response?

Computer Science & Information Technology

The Internet has become a platform for storing both applications and ____ and for building complex Web-based applications.

A. computers B. data C. systems D. information

Computer Science & Information Technology

?Thestrongelement is a text-level element that marks a text of great importance.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A technician removed several instances of malware from a customer’s Windows PC. Now when the user double-clicks .doc files to open them, an error message appears asking what program to use to open the files.   Which of the following is the most likely cause for this error?

A. The malware removal process changed the file association for the .doc file type. B. The application used to open .doc files was corrupted during the malware removal process. C. The malware removal process deleted the file the user was attempting to open. D. The DLL file for the .doc file type was erased during the malware removal process.

Computer Science & Information Technology