A(n) __________ lock is useful for a situation in which__________

a) spin lock; the system load is high
b) read/write lock; the protected resource is often accessed without being altered
c) sleep/wakeup lock; system load is light.
d) adaptive lock; system load is static.


b) read/write lock; the protected resource is often accessed without being altered

Computer Science & Information Technology

You might also like to view...

In the statement cout << *p1;, the * is called the ________________

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

An HTML ____________________ is a collection of HTML elements used to gather data that a user enters online.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A direct message is essentially a ________, with its inherent 140-character limit, sent directly and privately to another user

A) tweet B) Tweeter C) projected tweet D) retweet

Computer Science & Information Technology

IPv6 is unlikely to run out of available IP addresses because it enables 2128 addresses.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology