A deadlock is a situation in which two computer programs sharing the same resource are effectively...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
A deadlock is a situation in which two computer programs sharing the same resource are effectively preventing each other from accessing the resource, resulting in both programs ceasing to function. a) A system has 32MB of user memory and a disk, CD-ROM and a line printer attached to it. Two processes A and B, with the size of 8MB and 12MB are currently in the memory. Process A requests and gets the CD-ROM. It is currently writing something to the device. Process B also requests for the CD-ROM. Explain the characteristics of pre-emptable and non-pre-emptable resources. (2 marks) ii. Identify pre-emptable resources and non-pre-emptable resources from the description given above. (2 marks) Discuss whether or not CD-ROM can be allocated to Process B before Process A finishes their task. (4 marks) b) Two processes P1 and P2 needs to read and update data on a tape file and print the result on a printer. i. Explain the steps showing how deadlock might occur in the above scenario. (2 marks) Draw a resource allocation graph to support your explanation. (2 marks) c) A computer has three USB drives and three processes. Each of the three processes able to hold one of the USB drives. Explain the steps showing how to avoid deadlock to take place in the above scenario. (4 marks) d) Describe the fate of the "victim" in deadlock resolution and the actions required in order to complete the victim's tasks. A deadlock is a situation in which two computer programs sharing the same resource are effectively preventing each other from accessing the resource, resulting in both programs ceasing to function. a) A system has 32MB of user memory and a disk, CD-ROM and a line printer attached to it. Two processes A and B, with the size of 8MB and 12MB are currently in the memory. Process A requests and gets the CD-ROM. It is currently writing something to the device. Process B also requests for the CD-ROM. Explain the characteristics of pre-emptable and non-pre-emptable resources. (2 marks) ii. Identify pre-emptable resources and non-pre-emptable resources from the description given above. (2 marks) Discuss whether or not CD-ROM can be allocated to Process B before Process A finishes their task. (4 marks) b) Two processes P1 and P2 needs to read and update data on a tape file and print the result on a printer. i. Explain the steps showing how deadlock might occur in the above scenario. (2 marks) Draw a resource allocation graph to support your explanation. (2 marks) c) A computer has three USB drives and three processes. Each of the three processes able to hold one of the USB drives. Explain the steps showing how to avoid deadlock to take place in the above scenario. (4 marks) d) Describe the fate of the "victim" in deadlock resolution and the actions required in order to complete the victim's tasks.
Expert Answer:
Answer rating: 100% (QA)
SOLUTION a i Preemptable resources These are resources that can be taken away from a process before it has completed its task without causing any harm or inconsistency The process can be paused and th... View the full answer
Related Book For
Principles Of Information Security
ISBN: 9780357506431
7th Edition
Authors: Michael E. Whitman, Herbert J. Mattord
Posted Date:
Students also viewed these economics questions
-
Biz Partnership allows partner Mandy to sell her $100,000 equity in the partnership to Brittney. Brittney pays Mandy $85,000. Record the partnership's journal entry for the sale of Mandy's interest...
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
Managing Scope Changes Case Study Scope changes on a project can occur regardless of how well the project is planned or executed. Scope changes can be the result of something that was omitted during...
-
What is the advantage of using computing to simulate an automobile crash test as opposed to actually staging a crash?
-
A 30-year mortgage of $100,000 at 5.5% interest compounded monthly, with three discount points, has a monthly payment of $567.79. Assume that the loan is expected to be terminated after 8 years, at...
-
Solve Prob. 451 using Castiglianos theorem. Prob. 451, The figure shows a rectangular member OB, made from ¼-in-thick aluminum plate, pinned to the ground at one end and supported by a...
-
What types of regulatory compliance are organizations responsible for?
-
In recent years Howard Company has purchased three machines. Because of frequent employee turnover in the accounting department, a different accountant was in charge of selecting the depreciation...
-
Download the Conservation of Momentum Lab worksheet . Select to launch the momentum simulation. https://phet.colorado.edu/en/simulations/collision-lab In the simulation, select the "Intro" tab. For...
-
What are some of the arguments for and against using the term industrial relations to describe union management relationships?
-
1. Carry out the analysis in sub-section 5.4 (which is above) that compares land use policy and fuel tax policy. Report your findings clearly but briefly. 2. Offer some interesting thoughts on your...
-
Explain the significance of a party transferring a negotiable instrument endorsed without recourse. When is this type of endorsement used?
-
Describe the two elements of ownership in a condominium and how they affect responsibility for maintenance.
-
Does a contract of guarantee have to be in writing?
-
Is it necessary for an insured to notify the insurer of changes of circumstance that occur after the policy enters into force?
-
In what respect may bankruptcy bring about the discharge of contracts?
-
Two capacitors of capacitance 1.0 microfarad and 2.0 microfarad are each charged by being connected across a 5.0-Volt battery. They are disconnected from the battery and then connected to each other...
-
Suppose that A is an m n matrix with linearly independent columns and the linear system LS(A, b) is consistent. Show that this system has a unique solution.
-
Which of the following terms is used to describe the information used in conjunction with an algorithm to create the ciphertext from the plaintext or derive the plaintext from the ciphertext? a....
-
Detail that The Certified Secure Software Lifecycle Professional (CSSLP) is another (ISC)2 certification focused on the development of secure applications. Encourage students to understand that to...
-
Conclude that the United States has been a leader in the development and implementation of information security legislation that prevents the misuse and exploitation of information and information...
-
Tesco plc is one of the worlds largest food retailers. Fiscal year 2014 (the year ended February 28, 2015) was a rocky year for the retailer. The companys sales and margins had come under pressure as...
-
Exhibit P2 displays a selected set of financial ratios for the years 20152017 of three fashion retailers: USbased Gap, UK-based Next, and Japan-based Uniqlo (Fast Retailing). Using this set of...
-
In 2009, following the worldwide credit crisis, several US-based car manufacturers, such as Chrysler and General Motors, approached bankruptcy and needed to be bailed out by the US government and...
Study smarter with the SolutionInn App