What is the correct answer?


______________ is a situation in which two computer programs sharing the same resource are effectively preventing each other from accessing the resource, resulting in both programs ceasing to function.

A. Semaphore

B. Deadlock

C. Mutual Exclusion

D. No preemption

Correct Answer :

B. Deadlock

Related Questions

A _______________in a distributed system is a string of bits or characters… ____________approach can place the data directly into the memory or take… The operating system is the most common type of ___ Software In ________________________ each node periodically sends a message to… An option commonly takes the form of a _____followed by __________characters. _____________ manage the name spaces and binds an object to its location. The ___ contains commands associated with the My Computer window In ____________ location policies a random node is polled to check its… IDL stands for_____________________ The _____________ are based on modification of the original message in… Having data belonging to two independent processes in the same page is… You can move a window to a different position on your screen by dragging… In case of modification an unauthorized party not only gains access to… A sequence of instructions telling the computer what to do is called a_____________ Underlined text, such as text and folder names is referred to as Which of the following operating system reads and reacts in actual time? A _____________is a collection of processors that do not share memory,… The early ARPAnet is an example of a distributed computing system based… When you start up the computer the boot up storage at which the BIOS versions… _______________refers to a strategy where whenever a resource is requested,… A process may create a new process by executing ___________system call. IPC stands for _________ Bootstrapping is also known as ______ What is Dr. Watson? A page fault occurs when Because the I/O devices are not synchronized with the CPU, some information… _____________typically contains temporary data such as subroutine parameter,… Transparent RPC mechanism refers to : In case of ____________________transparency a file can transparently move… An unauthorized party inserts counterfeit objects into the system is called_________________