Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Explain the various methods for handling deadlocks.
A set of processes is deadlocked if every process in the set is waiting for an event that only a process in the set is able to cause. Deadlock be able to occur whenever two or more processes are competing for limited resources and the processes are allowed to acquire and hold a resource (obtain a lock) so preventing others from using the resource while the process waits for other resources.
There are 4 essential conditions for deadlock to occur:
1. Mutual exclusion
2. Hold and wait
3. Non-preemption
4. Circular wait:
The dissimilar methods used by OS for handling deadlocks are:
a) Deadlock detection and recovery
b) Deadlock prevention
c) Deadlock avoidance
Q. The RC 4000 system as well as other systems have defined a tree of processes (called a process tree) such that all the descendants of a process are given resources (objects) as
What are the operations that can be performed on a directory? The operations that can be performed on a directory are Search for a file Create a file Delete a
Q. Consider a distributed system with two sites A and B. Consider whether site A can distinguish among the following: a. B goes down. b. The link between A and B goes down.
Question : (a) The dynamic allocation problem is how to satisfy a request of size n from a list of free holes into memory. The best-fit, first-fit and worst-fit strategies are
Explain root partition The root partition,which have the operating-system kernel and potentially other system files, is mounted at boot time. In successful mount operation, ope
Explain the Peterson's solution for the critical section problem? In Peterson's solution two variables a) flag and b) turn are used as shared variables. If the both shared vari
Q. Why is it complicated to protect a system in which users are allowed to do their own I/O? Answer: In earlier chapters we identified a distinction among kernel and user mod
Define Segmentation The memory allocation method subject to “external” fragmentation is Segmentation.
Define semaphore A semaphore is a protected abstract or variable data type that constitutes the classic method for restricting access to shared resources like shared memory in
Synchronization In communication among processes messages passed may be blocking or nonblocking - also called as synchronous and asynchronous. Blocking send : The sending pr
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd