_______________refers to a strategy where whenever a resource is requested, it is only granted if it cannot result in deadlock.

A. Deadlock Prevention

B. Livelock

C. Deadlock avoidance

D. none of these

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. Which of the following operating system reads and reacts in actual time?
  2. Pick the wrong statement from the following.
  3. A process may create a new process by executing ___________system call.
  4. Which is the layer of a computer system between the hardware and the user program
  5. ____________approach can place the data directly into the memory or take the data directly from the…
  6. All of the following are TRUE regarding virtual memory EXCEPT
  7. Wiretapping to capture data in a network is an example of ________________
  8. A small part of taskbar that has icons of background running applications is
  9. In case of ________________the server automatically copies files to other servers after the files are…
  10. In case of ____________________transparency a file can transparently move to another server.
  11. Which command is used to display the contents of the text file of DOS?
  12. You can move a window to a different position on your screen by dragging it by its
  13. The _________takes any characters from standard input, and then echoes them to standard output.
  14. The maximum size of a write file is limited to only
  15. ____ runs on a computer hardware and serves as a platform for other system to run on
  16. Underlined text, such as text and folder names is referred to as
  17. In Windows, start button is used to
  18. In case of good process migration mechanism, _____________ means failure of any node other than the…
  19. A _______________in a distributed system is a string of bits or characters that is used to refer to…
  20. The essential difference between an operating system like Linux and one like Windows is that
  21. When a peripheral device needs immediate attention from the operating system, it generates a(n)
  22. When you start up the computer the boot up storage at which the BIOS versions manufacturer and data…
  23. Identify the distributed computing model from the following statement. In this model, the user's processes…
  24. A _____________is a collection of processors that do not share memory, peripheral devices,or a clock.
  25. The find command is different from most UNIX commands in that each of the argument expressions following…
  26. A page fault occurs when
  27. _____________typically contains temporary data such as subroutine parameter, return address, and temporary…
  28. In_________________ model, when a process does a release access, the contents of all the modifications…
  29. A program to be executed must be in ---------------
  30. ______________ occurs when multiple processes or threads read and write data items so that the final…