The Bankers algorithm is used

A. to prevent deadlock

B. to rectify deadlock

C. to detect deadlock

D. to slove deadlock

You can do it
  1. A process is _________________
  2. A process is ____________________
  3. PVM stands for
  4. A bar that inform you the available options in your computer, opened applications, background running…
  5. Which buffering strategy is used for implementing synchronous communication?
  6. Which of the following is not essential to shut down your computer?
  7. Identify the server:This type of server generally remains in existence indefinitely. It is shared by…
  8. The Network Time Protocol is similar to _______________algorithm in that synchronization is also performed…
  9. Two clocks are said to be synchronized at a particular instance of time if the difference in time values…
  10. A process may create a new process by executing ___________system call.
  11. ______________ is a situation in which two computer programs sharing the same resource are effectively…
  12. Creation of a semaphore set is done using the _______system call.
  13. DSM stands for______________
  14. Most accurate global time is based on oscillations of the ______________
  15. When a peripheral device needs immediate attention from the operating system, it generates a(n)
  16. A shared memory segment first needs to be allocated (create, using the__________ system call.
  17. The primary purpose of an operating system is a …
  18. Identify the distributed computing model from the following statement. In this model, the user's processes…
  19. In ________________________ each node periodically sends a message to the time server.
  20. The find command is different from most UNIX commands in that each of the argument expressions following…
  21. The operating system is the most common type of ___ Software
  22. The early ARPAnet is an example of a distributed computing system based on the ________________.
  23. Objects location is found by _________________
  24. To install the new font
  25. The usual su command syntax is
  26. Transparent RPC mechanism refers to :
  27. In case of ____________________transparency a file can transparently move to another server.
  28. Which command is used to display the contents of the text file of DOS?
  29. _______________occurs when two or more execution flows are able to run simultaneously.
  30. In___________, the requesting device or devices assert the signal bus_request.