This class is used to help implement mutual exclusion.

a. MutEx.
b. Condition.
c. Lock.
d. Signal.


c. Lock.

Computer Science & Information Technology

You might also like to view...

The DBMS works directly with the data and sends the results of operations back to the ____________.

a. application b. data c. DBMS d. CPU

Computer Science & Information Technology

What is another word for shareware?

A. Trialware B. Freeware C. Commercial software D. Software piracy

Computer Science & Information Technology

When you save a query, you are saving the query results, not the design.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The evaluation plan has to specify the provisions to assure the continuing ____ of the overall security process.

A. compliance B. renewal C. trustworthiness D. revision

Computer Science & Information Technology