Home

______________ is a situation in which two computer programs sharing the same resource are effectively preventing each other from accessing the resource, resulting in both programs ceasing to function.

A. Semaphore

B. Deadlock

C. Mutual Exclusion

D. No preemption

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. The algorithm should be scalable i.e. _____________.
  2. _________, as a feature of good distributed file system, clients should be able to continue working…
  3. In ________________________ each node periodically sends a message to the time server.
  4. Which is the layer of a computer system between the hardware and the user program
  5. The two sub systems of user mode layer of windows 2000 are _________ and __________
  6. Pick the wrong statement from the following.
  7. A bar that inform you the available options in your computer, opened applications, background running…
  8. ______________approach simplifies debugging and system verification.
  9. Once text has been cut to the clipboard, you can____hat text into another document
  10. A program to be executed must be in ---------------
  11. Load balancing algorithms in ______________ class use the processor and process characteristics to allocate…
  12. When copying more than one file at a time, you must specify an existing directory as the ___________
  13. In layered approach each layer uses the functions and services of ------------------
  14. Choose the correct statement from the following.
  15. The Network Time Protocol is similar to _______________algorithm in that synchronization is also performed…
  16. __________ deals with when a modified page should be written out to secondary memory.
  17. The controller can access memory in memory cycles which are not used by the particular bank of memory…
  18. The ______________ unpacks the call receipt messages from local RPC Runtime and makes a perfect local…
  19. The find command is different from most UNIX commands in that each of the argument expressions following…
  20. Which of the following is/are external commands?
  21. Underlined text, such as text and folder names is referred to as
  22. The essential difference between an operating system like Linux and one like Windows is that
  23. BSD stands for_____________________
  24. A process may create a new process by executing ___________system call.
  25. You can move a window to a different position on your screen by dragging it by its
  26. Ext2 is the standard file system of _______ and uses a block size of_____bytes
  27. The problem with logical dumping is ________________
  28. Wiretapping to capture data in a network is an example of ________________
  29. SRM stands for
  30. The primary purpose of an operating system is: