Assume we have locks X and Y with operations lock and unlock. Show how we can get a deadlock in the code of the previous question. _________

Fill in the blank(s) with the appropriate word(s).


One assignment: lock(x); lock(y); A := 2*A; A:=A+1; unlock(x);
unlock (y);
Second assignment: lock(y); lock(x); A := 2*A; A:=A-1; C:= 2*A; unlock
(y);unlock(x);

Computer Science & Information Technology

You might also like to view...

The term ________ refers how data are placed in cells

A) positioning B) alignment C) configuration D) arrangement

Computer Science & Information Technology

Which sentence is abbreviated correctly when this is the first time the abbreviation is used in the document??

A. ?The National Weather Service (NWS) issues weather forecasts and warnings. B. ?The NWS (National Weather Service) issues weather forecasts and warnings. C. ?The NWS issues weather forecasts and warning.

Computer Science & Information Technology

The command to configure a DNS lookup on a Cisco router is ____.

A. ip domain-lookup B. ip dns C. ip name-server D. ip dns-server

Computer Science & Information Technology

A network topology in which the central node is connected to two or more subordinate nodes that, in turn, are connected to other subordinate nodes. (subordinate not hyphenated in text)

A. bus B. star C. mesh D. tree

Computer Science & Information Technology