Answer the following statements true (T) or false (F)

1) An indirect method of deadlock prevention is to prevent the occurrence of a
circular wait.
2) If access to a resource requires mutual exclusion then mutual exclusion must be supported by the OS
3) The OS may preempt the second process and require it to release its resources if a process requests a resource that is currently held by another process.
4) Deadlock avoidance requires knowledge of future process resource requests.
5) An unsafe state is one in which there is at least one sequence of resource allocations to processes that does not result in a deadlock.


1) F
2) T
3) T
4) T
5) F

Computer Science & Information Technology

You might also like to view...

The advantage of a linear search is its

a. complexity b. efficiency c. simplicity d. speed e. None of these

Computer Science & Information Technology

Memory management methods of the vector class include all of the following except:

(a) remove() (b) trimToSize() (c) capacity() (d) size()

Computer Science & Information Technology

Case-Based Critical Thinking QuestionsCase 10-2Misaki is a new Reservation Specialist for an event rental company. She has asked the database administrator, Kirk, to develop an interface for her to access the database objects she needs because she is not familiar with Access. Kirk agrees to create the interface.  He realizes that the greatest benefit of the interface is to minimize ____.

A. the user's ability to use the database B. the information available from the database C. data being corrupted inadvertently D. the administration of the database

Computer Science & Information Technology

To insert a column in a table, you must first

A. click the Table Tools Layout tab B. click the Insert tab C. click the insertion point in the column adjacent to where the new column will be inserted D. click the Table Tools Design tab

Computer Science & Information Technology