adplus-dvertising
frame-decoration

Question

The common technique used for protecting a critical section in Linux is the

a.

Lock Step

b.

Program lock

c.

Spinlock

d.

None

Posted under Operating System

Answer: (c).Spinlock

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. The common technique used for protecting a critical section in Linux is the

Similar Questions

Discover Related MCQs

Q. Once deadlock has been detected, some strategy is needed for

Q. Deadlock involves reusable

Q. UNIX provides a variety of mechanisms for inter processor

Q. A useful tool in characterizing and allocating of resources to process is the

Q. The conditions for deadlock, only one process may use a resource at a

Q. To solve the dining philosophers, the monitor consist of two

Q. A direct method of deadlock prevention is to prevent the occurrence of a circular

Q. The dining philosophers problem can be seen as representative of

Q. Linux includes all of the concurrency mechanism found in other

Q. An unsafe state is of course a state that is not

Q. The circular wait condition can be prevented by defining a linear ordering of

Q. Deadlock avoidance requires knowledge of future

Q. No preemption means that a resource is released as

Q. A signal is a software mechanism that informs a

Q. A consumable resource is one that can be

Q. Deadlock prevention strategies are very

Q. The fastest form of inter process communication provided in UNIX is

Q. All deadlocks involve conflicting needs for

Q. Banker's algorithm for resource allocation deals with

Q. Four necessary conditions for deadlock to exist are: mutual exclusion, no-preemption, circular wait and