When a thread that owns a lock invokes method release, the lock enters the________state.

a) unlocked.
b) running.
c) ready.
d) None of the above.


a) unlocked.

Computer Science & Information Technology

You might also like to view...

The bounds on a string are always:

a) 0 to string.Length. b) 1 to string.Length. c) 0 to string.Length - 1. d) 1 to string.Length - 1.

Computer Science & Information Technology

Which of the following is defined as a relationship between two or more entities that describes how they will use the security services to communicate?

A. pairing B. security association C. internet key exchange D. tunnel

Computer Science & Information Technology

What is displayed by the following code?

``` String[] tokens = "A,B;C;D".split("[,;]"); for (int i = 0; i < tokens.length; i++) System.out.print(tokens[i] + " "); ``` a. A,B;C;D b. A B C D c. A B C;D d. A B;C;D

Computer Science & Information Technology

?Using one of the buttons on the Paste button menu allows you to choose to keep the source file theme and formatting or apply the theme and formatting in the destination file.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology