________ occurs when a low-priority process temporarily is assigned higher priority than a high-priority process.

a) Indefinite postponement
b) Priority inversion
c) Batch processing
d) Deadlock


b) Priority inversion

Computer Science & Information Technology

You might also like to view...

The storage locations in an array are known as ____________.

a. values b. sectors c. compartments d. elements

Computer Science & Information Technology

To convert a char variable to a string, call its ____________ method.

a. Compare To b. To String c. Equals d. Get Type

Computer Science & Information Technology

The ultimate goal of risk management is to reduce all risk to a level acceptable to the organization

Indicate whether the statement is true or false

Computer Science & Information Technology

A measurement of the percentage of individuals who have gained access to a system via biometrics but should not have been granted such access is called ________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology