Name one other mutual exclusion constraint the algorithm in Fig. 5.24 violates.
What will be an ideal response?
The algorithm violates the constraint that a thread outside its critical section cannot prevent another thread from entering its critical section. In this algorithm, if T1 never exe- cutes, and turn is equal to 1,T2 will never execute its critical section code.
You might also like to view...
Which RFC defines a method for discovering a Path MTU (PMTU) using ICMP?
A. RFC 1191 B. RFC 1241 C. RFC 1542 D. RFC 1577
____________________ is used widely in long-haul optical communication.
Fill in the blank(s) with the appropriate word(s).
Styles created manually are only temporary and cannot be saved to use in the future
Indicate whether the statement is true or false
Method calls start with the method name and are followed by a dot, the object name, and parentheses for enclosing arguments.
Answer the following statement true (T) or false (F)