Answer:
See Explaination
Explanation:
Separating this critical section into two sections:
void transaction(Account from, Account to, double amount)
{
Semaphore lock1, lock2;
lock1 = getLock(from);
lock2 = getLock(to);
wait(lock1);
withdraw(from, amount);
signal(lock1);
wait(lock2);
deposit(to, amount);
signal(lock2);
}
will be the best solution in the real world, because separating this critical section doesn't lead to any unwanted state between them (that is, there will never be a situation, where there is more money withdrawn, than it is possible).
The simple solution to leave the critical section in one piece, is to ensure that lock order is the same in all transactions. In this case you can sort the locks and choose the smaller one for locking first.
Answer:
a. The network will not satisfy the customers because the required addresses is 128 but what can be offered is 126.
b. 195.200.0.0/22
Explanation:
195.200.0.0/16
The number of bits to give 512 is 9
2^9=512
2^8=256 which is not up to our expected 320 customers that requires a network ip
Note we have to use a bit number that is equal or higher than our required number of networks.
The number of host per each subnet of the network (195.200.0.0/25) is (2^7)-2= 128-2=126
The network will not satisfy the customers because the required addresses is 128 but what can be offered is 126.
b. 64 customers requires 6 bits to be taken from the host bit to the network bit
i.e 2^6 = 64
195.200.0.0/22
The number of host per each subnet of the network (195.200.0.0/22) is (2^10)-2=1024 - 2 = 1022 hosts per subnet
This network meet the requirement " 64 customers want 128 addresses/customer "
Answer:
A dictionary is a "key - value" pair data structure type. The syntax for creating a dictionary requires that the keys come first, before the values.
This problem in the question above is as a result of you interchanging the keys and values. THE KEYS MUST COME FIRST BEFORE THE VALUES
Explanation:
To solve this problem you will need to rearrange the code this way
points_to_names = {"home":[0, 0] , "school":[1, 2], "market":[-1, 1] }
See the attached code output that displays the dictionary's keys and values
Answer:
Explanation:
1. Authentication is a method for confirming users' identities. Once a system determines the authentication of a user, it can then determine the access privileges for that user. Authorization involves providing a user with permission, including access levels and abilities. For example file access, hours of access, and amount of allocated storage space.
2. Content filtering is a software organizations use that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information. Encryption scrambles information into an alternative form that requires a key or password to decrypt. In a security branch, an intruder is then unable to read encrypted information. A firewall is hardware and/or software that guard a private network by analyzing incoming and outgoing information for the correct markings.
3. Intrusion detection software (IDS) features full-time monitoring tools that search for patterns in network traffic to identify intruders.