Home

_______________refers to a strategy where whenever a resource is requested, it is only granted if it cannot result in deadlock.

A. Deadlock Prevention

B. Livelock

C. Deadlock avoidance

D. none of these

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. _____________ manage the name spaces and binds an object to its location.
  2. ______________ occurs when multiple processes or threads read and write data items so that the final…
  3. A process is already split into pieces, called________________.
  4. In case of modification an unauthorized party not only gains access to but tampers with an asset. This…
  5. All of the following are TRUE regarding virtual memory EXCEPT
  6. The essential difference between an operating system like Linux and one like Windows is that
  7. An option commonly takes the form of a _____followed by __________characters.
  8. Which of the following is/are external commands?
  9. A standard UNIX system includes a set of ___________ and a set of ___________.
  10. To install the new font
  11. ___________variable is not automatically created on all UNIX systems but is used by so many programs…
  12. Find out the characteristics of System-oriented names:
  13. The Network Time Protocol is similar to _______________algorithm in that synchronization is also performed…
  14. ____________ file system allows sharing in multiple different locations grouped under one folder.
  15. The _________takes any characters from standard input, and then echoes them to standard output.
  16. In layered approach each layer uses the functions and services of ------------------
  17. The name services of DCE include ________
  18. _______refers to the block size of the DSM system, i.e. to the units of sharing and the unit of data…
  19. A two-byte integer called ____________is interpreted as an index into an array of inodes in a fixed,…
  20. Identify the distributed computing model from the following statement. In this model, the user's processes…
  21. What is dispatch latency?
  22. In _______, if a processor writes the value 100 to the memory location x, this write operation will…
  23. The ___ contains commands associated with the My Computer window
  24. What is the function of radio button?
  25. What is Dr. Watson?
  26. Which of the following does not occur during the power-on-self-test (POST)?
  27. Identify the server:This type of server generally remains in existence indefinitely. It is shared by…
  28. Load balancing algorithms in ______________ class use the processor and process characteristics to allocate…
  29. In the case of____________ , changes to an open file are only locally visible.
  30. Which one is true for unconditional disk formatting?