When resources have multiple instances ________ is used for deadlock Avoidance.

A. Bankers algorithm

B. Resource Allocation Graph

C. semaphores

D. all of these

Related Questions

  1. A process is _________________
  2. Process migration involves__________________
  3. One of the wonderful things about UNIX is its ___________names.
  4. Identify the server:This type of server generally remains in existence indefinitely. It is shared by…
  5. The _________takes any characters from standard input, and then echoes them to standard output.
  6. The essential difference between an operating system like Linux and one like Windows is that
  7. Wiretapping to capture data in a network is an example of ________________
  8. BSD stands for_____________________
  9. Creation of a semaphore set is done using the _______system call.
  10. Which of the following is an essential file of a MS-DOS boot disk?
  11. A two-byte integer called ____________is interpreted as an index into an array of inodes in a fixed,…
  12. _______refers to the block size of the DSM system, i.e. to the units of sharing and the unit of data…
  13. Which components appear in the initial windows start up display?
  14. Which one is true for unconditional disk formatting?
  15. ___________variable is not automatically created on all UNIX systems but is used by so many programs…
  16. A program to be executed must be in ---------------
  17. Fsck conducts a check in _____ phases
  18. Which one of the following statements is true?
  19. A _____________is a collection of processors that do not share memory, peripheral devices,or a clock.
  20. __ is the program run on a computer when the computer boots up
  21. In case of ________________the server automatically copies files to other servers after the files are…
  22. _____________ manage the name spaces and binds an object to its location.
  23. The primary purpose of an operating system is:
  24. In ________________________ each node periodically sends a message to the time server.
  25. An unauthorized party inserts counterfeit objects into the system is called_________________
  26. A process may create a new process by executing ___________system call.
  27. All of the following are TRUE regarding virtual memory EXCEPT
  28. What do you mean by 0-reliable level in multicast communication?
  29. The ___ contains commands associated with the My Computer window
  30. Recently deleted files are stored in

Please do not use chat terms. Example: avoid using "grt" instead of "great".