What is the correct answer?


_______________refers to a strategy where whenever a resource is requested, it is only granted if it cannot result in deadlock.

A. Deadlock Prevention

B. Livelock

C. Deadlock avoidance

D. none of these

Correct Answer :

C. Deadlock avoidance

Related Questions

A small part of taskbar that has icons of background running applications… The early ARPAnet is an example of a distributed computing system based… A shared memory segment first needs to be allocated (create, using the__________… DSM stands for______________ Most accurate global time is based on oscillations of the ______________ An unauthorized party inserts counterfeit objects into the system is called_________________ When resources have multiple instances ________ is used for deadlock Avoidance. The controller can access memory in memory cycles which are not used by… In Multics, a process could have up to 256K segments, but each segment… The two sub systems of user mode layer of windows 2000 are _________ and… The Network Time Protocol is similar to _______________algorithm in that… Because the I/O devices are not synchronized with the CPU, some information… ____________ file system allows sharing in multiple different locations… Which one of the following statements is true? Once text has been cut to the clipboard, you can____hat text into another… Which of the following is suitable after you install new drivers? Find out the characteristics of System-oriented names: The Basic Input Output System (BIOS) resides in The primary purpose of an operating system is: When you start up the computer the boot up storage at which the BIOS versions… A process may create a new process by executing ___________system call. In case of ____________________transparency a file can transparently move… _______________occurs when two or more execution flows are able to run… When a child dies, it sends a _______________signal to its parent. _____________ manage the name spaces and binds an object to its location. A process control block contains varies attributes required by _____________… RPN stands for The find command is different from most UNIX commands in that each of… In___________, the requesting device or devices assert the signal bus_request. A standard UNIX system includes a set of ___________ and a set of ___________.