Name one other mutual exclusion constraint the algorithm in Fig. 5.24 violates.

What will be an ideal response?


The algorithm violates the constraint that a thread outside its critical section cannot prevent another thread from entering its critical section. In this algorithm, if T1 never exe- cutes, and turn is equal to 1,T2 will never execute its critical section code.

Computer Science & Information Technology

You might also like to view...

Which RFC defines a method for discovering a Path MTU (PMTU) using ICMP?

A. RFC 1191 B. RFC 1241 C. RFC 1542 D. RFC 1577

Computer Science & Information Technology

____________________ is used widely in long-haul optical communication.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Styles created manually are only temporary and cannot be saved to use in the future

Indicate whether the statement is true or false

Computer Science & Information Technology

Method calls start with the method name and are followed by a dot, the object name, and parentheses for enclosing arguments.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology