Answer the following statements true (T) or false (F)

1. A thread is not runnable if it has terminated.
2. Some operating systems use timeslicing with threads. Therefore, they can enable threads to preempt threads of the same priority.
3. When the thread’s quantum expires, the thread returns to the running state as the op- erating system assigns it to a processor.
4. On a single-processor system without timeslicing, each thread in a set of equal-priority
threads (with no other threads present) runs to completion before other threads of equal priority get a chance to execute
5. To determine the difference between two Instants, use class Duration’s static method
difference, which returns a Duration object containing the time difference.


1. True.
2. False. Timeslicing allows a thread to execute until its timeslice (or quantum) expires.
Then other threads of equal priority can execute.
3. False. When a thread’s quantum expires, the thread returns to the ready state and the operating system assigns to the processor another thread.
4. True.
5. False. The Duration method for calculating the difference between two Instants is named between.

Computer Science & Information Technology

You might also like to view...

Live preview is available on a touch screen.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Critical Thinking QuestionsCase C-1Julius is using Photoshop to create the art for a poster advertising his office Halloween party, and he wants to make it look spooky by adding lots of shadows. He decides that the text should have a creepy, long drop shadow. In order to make the letters appear to cast long shadows, which of the following style options will Julius need to adjust?

A. Distance B. Size C. Angle D. Spread

Computer Science & Information Technology

What kind of index does CREATE TABLE generally yield? What kind of index does CREATE INDEX generally create? What is the advantage of the former kind of index over the latter kind?

What will be an ideal response?

Computer Science & Information Technology

Although a web enabled application appears to only allow letters in the comment field of a web form, malicious user was able to carry a SQL injection attack by sending special characters through the web comment field.Which of the following has the application programmer failed to implement?

A. Revision control system B. Client side exception handling C. Server side validation D. Server hardening

Computer Science & Information Technology