Database System Concepts
7th Edition
ISBN: 9780078022159
Author: Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher: McGraw-Hill Education
expand_more
expand_more
format_list_bulleted
Question
Q.No.4: Draw a Resource Allocation Graph (RAG) for a given scenario and find that whether it contains a deadlock or not. Find all cycles in the RAG.
Resources: Printer (R1), Hard Disk (R2), CPU (R3) and RAM (R4)
Processes: MS Excel (P1), MS Word (P2), Media Player (P3) and Calculator (P4)
· Resources: Printer = 1, Hard Disks = 2, CPU = 1, RAM = 1
· MS Excel Holds Printer and wait for CPU and RAM.
· MS Word holds Hard Disk and RAM and waits for Printer and CPU.
· Media Player waits for Hard Disk.
· Calculator holds CPU.
Write cycles in RAG if any?
Expert Solution
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
Step by stepSolved in 3 steps with 1 images
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- True or False In a weighted graph, edges have an associated number called weight, which might represent distances, costs, times, or other quantities. The minimum spanning tree in a weighted graph minimizes the total weights of the edges necessary to connect all the vertices. Graphs can represent many real-world entities, including airline routes, electrical circuits, and job scheduling. The adjacency matrix can be used to represent a graph's edges in a computer program. Topological sorting is useful for scheduling projects which contain many tasks contingent on other tasks. There may be many correct topological sorts for a given graph. You can create a topological sort of a graph that contains cycles.arrow_forwardPlease explain Some engineers at Google want you to implement a graph structure of the subway system in Boston showing the connections between each station.They are wondering what data structure to use to represent the graph and use the least amount of memory, given that most stations do not connect to many other stations. Which graph data structure representation should you use and why? Group of answer choices a. Adjacency List -- Because the complexity is O(V+E), the data structure is better at representing sparse graphs since their are fewer connections. b. Adjacency Matrix -- Because the complexity is O(V+E), the data structure is better at representing sparse graphs since their are fewer connections.arrow_forwardThe next diagram depicts a system of aqueducts that originate at three rivers (nodes R1, R2, and R3) and terminate at a major city (node T), where the other nodes are junction points in the system. R2 From R1 R2 R3 Το R1 R3 A B Using units of thousands of acre feet, the tables below show the maximum amount of water that can be pumped through each aqueduct per day. To D A B C From 130 115 A 70 90 110 B 140 120 с E F DEF From 110 85 130 95 85 130 160 DE T F To T 220 330 240 The city water manager wants to determine a flow plan that will maximize the flow of water to the city. a) Formulate this problem as a maximum flow problem by identifying a source, a sink, and the transshipment nodes, and then drawing the complete network that shows the capacity of each arc. b) Use the augmenting path algorithm described in Sec. 10.5 to solve this problem. List the augmenting path and c* for each iteration in a table. Show your final result by either listing the optimal flow assignment paths or…arrow_forward
- A medical Centre can have many doctors. A doctor can be scheduled for many appointments but may not have any scheduled appointment at all. A patient can schedule request for one or more appointments. However, every appointment is about only one patient. As a result of every appointment, there must be a bill. One payment is applied to exactly 1 bill, and 1 bill can be paid off over time by several payments. A bill can be outstanding, having nothing yet paid on it at all. One patient can make many payments, but a single payment is made by only 1 patient. Some patients are insured by an insurance company. If they are insured, they can only carry insurance with one company. An insurance company can have many patients carry their policies. For patients that carry insurance, the insurance company will make payments, each single payment is made by exactly 1 insurance company. (Hint: final ERD must include 7 tables.) a) Identify the entities with attributes and keys (primary and foreign keys).…arrow_forwardConsider a computer system with three users: Alice, Bob, and Cyndy. Alice owns the file alicerc, and Bob and Cyndy can read it. Cyndy can read and write the file bobrc, which Bob owns, but Alice can only read it. Only Cyndy can read and write the file cyndyrc, which she owns. Assume that the owner of each of these files can execute it. Create the corresponding access control matrix. Cyndy gives Alice permission to read cyndyrc, and Alice removes Bob's ability to read alicerc. Show the new access control matrixarrow_forwardQ3. We have a classification problem with four classes of input vector. The four classes are Class1: {[1 1], [1 2]}; Class 2: {[2 -1], [2 0]}; Class 3: {[-1 2], [-2 1]}; Class 4: {(-1 -1], [-2 - ( 2]}.Design a perceptron network to solve this problem.arrow_forward
- An operating system has processes P1, P2, P3, and P4 and resources R1 (one resource), R2 (one resource), R3 (two resources), and R4 (three resources). The notation (1, 1), (2, 2), (1, 2) means that P1 requests R1, then P2 requests R2, then P1 requests R2. Note that the first two requests produce allocation edges on the resource allocation graph, but the third request produces a request edge on the graph because R2 is already allocated to P2. Draw the resource allocation graph after each sequence of requests. State whether the graph contains a cycle. If it does, state whether it is a deadlock cycle. *(a) (1, 1), (2, 2), (1, 2), (2, 1) *(b) (1, 4), (2, 4), (3, 4), (4, 4) (c) (1, 1), (2, 1), (3, 1), (4, 1) (d) (3, 3), (4, 3), (2, 2), (3, 2), (2, 3) (e) (1, 2), (1, 3), (1, 4), (2, 2), (2, 3), (2, 4) (f) (2, 1), (1, 2), (2, 3), (3, 3), (2, 2), (1, 3) (g) (2, 1), (1, 2), (2, 3), (3, 3), (2, 2), (1, 3), (3, 1) (h) (1, 4), (2, 3), (3, 3), (2, 1), (3, 4), (1, 3), (4, 4), (3, 1), (2, 4) (i) (1,…arrow_forwardConsider an airport management system. Each airport has a unique id (e.g. Montreal:YUL). Let us introduce the types AIRPORT and CITY . We also introduce variable airports that contains associations between airport id’s and their corresponding host cities. A possible state of the system is shown below:airports ={YUL → Montreal,LCY → London_UKLHR → London_UK,MIL → Milan,SFO → San_Francisco,SDQ → Santo_Domingo}1. (PROGRAMMING) Define global variable airports in Common LISP and populate it with the above data. Demonstrate that the variable indeed contains the ordered pairs as shown above.2. Provide a declaration of variable monitored that holds all airport id’s.3. What kind of variable is airports? Provide a formal definition together with any and all applicable properties.4. Describe what data structure you would deploy to model variable airports. Note that you may not use a Dictionary. Should this be an ordered or an unordered structure? Discuss.5. Provide a formal specification of the…arrow_forwardGiven the following UML diagram: Student - studentID: String + getStudentID(): String + toString(): String Person - lastName: String - firstName: String - dateOfBirth: Date - address: Address + getName(): String + getDOB(): Date + getAddress(): Address + toString(): String Professor - employeeID: String +getEmployelD(): String +toString(): String Write an implementation for the class Professor. DO NOT include or implement any constructor for this class. There are no abstract methods/classes in this example. toString method will return any simple String that contains firstName and employeelD only; no less, no more!! Assume firstName was defined as protected in class Person. You are not allowed to add implementation for any class or methods other than what is listed in the question statement.arrow_forward
- Need a implementation plan for this : Our aim is to take increase toy paratrooper flight time with the parachutes provided and find suitable alternatives to reduce its descent through the most feasible means. The justification for increased flight time being if we were to take these model paratroopers to represent actual paratroopers' lower descent speeds will provide safer landings and more maneuverable descents. We learned through observation that our paratrooper's initial descent is practically freefall and extremely erratic which gives us our main point of optimization. Our only variables which we can alter are wind resistance provided by said parachute, elevation, conditions(temperature) within a margin, and weight. We will make alterations where it is possible to reach our goal of a practical lower descent speed and thereby an increase in descent time and more stable, safe flight for our toy paratroopers.arrow_forwardq18arrow_forwardConsider navigating the maze shown below. 3. 4. (z) 1. S 2. A 5. N L M G B F H 6. D 7. P 2 8. G 2 4 C E P 2 2 2 A S The maze is represented as a graph with edge costs as shown on the edges. The edge cost is 1 for all edges where the cost is not shown. Let S be the initial state and G be the goal state. List the first 8 vertices expanded by Uniform Cost Search (enter the single letter label of a node). B FL K 2 2 J 2 D Harrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education