A group of n pirates has a treasure chest and one unique lock and key for each pirate. Using hardware that is probably already lying around their ship, they want to protect the chest so that any single pirate can open the chest using his lock and key. How do they set this up?

What will be an ideal response?


The pirates link their locks together with links of chain and wrap that chain
around the treasure chest (augmenting with a extra links of chain if the chain with the locks
is not long enough). If any pirate opens his lock it breaks the chain and he can open the
chest.

Computer Science & Information Technology

You might also like to view...

The ____ control can be used to send a message to each of the items in an array.

A. send items _ B. index iterator _ C. for each in _ D. while array _

Computer Science & Information Technology

The chdir system call changes the

A. current directory of the calling process B. the name of "." in the current directory

Computer Science & Information Technology

Object-oriented techniques work well in situations where ________ information systems are undergoing continuous maintenance, adaptation, and redesign.

A) complicated B) simple C) highly technical D) global

Computer Science & Information Technology

____ are small programs stored on the hard drive that tell the computer how to communicate with a specific hardware device such as a printer, network card , or modem.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology