Is it possible to have a deadlock involving only one process? Explain. Describe the techniques in Layer 2 that prevent errors. Describe the methods in Layer 2 that control errors. Name four authentication policies that can be enforced using technology and four...