answersLogoWhite

0


Best Answer

yes,it's possible.

User Avatar

Wiki User

βˆ™ 12y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Can there are more than one safe sequence in banker's algorithm in os?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Do bankers use fractions?

Yes, bankers use fractions because fractions are the same as percentage. and they need percentage for exact change and for knowing how much money is in the safe.


How do you spell commbination?

The correct spelling is "combination" (one or more things used together). It is notably used to mean the sequence of numbers used to open a lock or safe.


How do you reset the code for a Model 5074 brinks home security safe?

I have a brinks 4 no. Safe gorgot the turning sequence for it can u help?


What are the deadlock detection algorithms?

Deadlock is a scenario where two or more processes are blocked, each waiting for the other to release the necessary resources to complete their execution. This situation can cause the entire system to become unresponsive, leading to reduced performance and potentially crashing the system. To avoid this, it is essential to have an effective deadlock detection algorithm in place. Several deadlock detection algorithms are used in modern computer systems. These algorithms use different approaches to detect deadlocks, and each algorithm has its strengths and weaknesses. Wait-for Graph Algorithm: The wait-for graph algorithm is a commonly used deadlock detection algorithm. In this algorithm, a directed graph is created, where the nodes represent the processes, and the edges represent the resources they are waiting for. The algorithm checks if there is a cycle in the graph. If there is a cycle, there is a deadlock in the system. The wait-for-graph algorithm has a few limitations. It can only detect deadlocks and does not provide any mechanism to recover from them. Also, the algorithm may only work well in large systems with a few resources. Resource Allocation Graph Algorithm: The resource allocation graph algorithm is another widely used deadlock detection algorithm. This algorithm creates a graph where the nodes represent the processes and the resources they hold or need. The algorithm checks for cycles in the graph. If there is a cycle, there is a deadlock in the system. The resource allocation graph algorithm is easy to implement and provides an efficient way to detect deadlocks. However, the algorithm requires considerable memory to store the graph, and it can be slow in large systems. Banker's Algorithm: The Banker's algorithm is a resource allocation and deadlock avoidance algorithm. In this algorithm, each process is given a maximum limit on the number of resources it can use. The algorithm checks if granting the requested resources will result in a safe state or not. If the state is safe, the resources are allocated to the process. If the condition is unsafe, the process is put on hold. The Banker's algorithm is an efficient way to prevent deadlocks. However, it requires considerable overhead to maintain the system's state, and it may only work well in systems with a few resources. Ostrich Algorithm: The Ostrich algorithm is a dynamic deadlock detection algorithm. This algorithm assumes a process is deadlocked if it does not progress for a specified period. The algorithm periodically checks the progress of each method and detects if any process is deadlocked. The Ostrich algorithm is efficient in detecting deadlocks in dynamic systems. However, it may not work well in systems where the processes are short-lived, and the algorithm may not detect deadlocks that occur over a short period. Timeout-based Algorithm: The timeout-based algorithm is another dynamic deadlock detection algorithm. This algorithm sets a timer for each resource request made by a process. If the requested resource is not allocated within the specified time, the process is assumed to be deadlocked. The timeout-based algorithm is an efficient way to detect deadlocks in dynamic systems. However, the algorithm may not work well in systems where the processes are short-lived, and it may produce false positives if the time-out period is too short.


What is the proper dialing sequence for a Winchester combination gun safe circa 1980's?

Contact the maker.


How to Decode combination lock on Victor safe?

When you purchase the safe you should get the combination sequence with it. If the sequence needs to be reset or the tumblers malfunction you will need to call a locksmith to have the internal pins reset. If you lose the code or combination, a locksmith will be able to reset it without damaging the inner mechanisms.


How safe is online password storage?

Online password storage is safe as long as one deletes their browsing history when they are finished unless it is a personal computer. They are very safe because they are generated randomly by a computer sequence.


How do you use the word sequence in a sentence?

Baking a cake usually involves a specific sequence of steps to follow.To open the safe in the bank's central office, you must enter the correct code numbers in the proper sequence, as otherwise it will be sealed off by its security system.The police were able to establish the sequence of events that led to the accident.


Are proxies safe?

They are very safe. Not completely safe but more then enough-


Is the iPhone app oneSafe actually safe?

Yes! oneSafe is using the strongest encryption algorithm available, AES256, to store securely all your confidential on your iPhone or iPad. The key used by the encryption algorithm is randomly generated and no one is able to decode the data without the password configured during the first utilization.


Does encrypting an Email secure the Email?

Encrypting an email is a process where a computer program is used to incorporate a complex algorithm to the email. The complex algorithm makes the emails original computer coding (i.e. binary code) much more complex. By making the email's computer code more complex makes it difficult for hackers of infiltrate and interpret the contents of the email. Some email encrypting programs may very. Some versions of encryption adds the complex algorithm to the actual email itself when sending it out. Other programs house the email with in a type of "lock safe" that is protect by a strong algorithmic wall of protection and awaits the recipient of the email to click a link (which acts like a key to the "safe") to access the housed email.


What is the comparative adjective for safe?

if you are more safe you are saferif you are less safe you are dangerous/vulnerable