If another thread attempts to invoke method acquire on an unavailable lock, the operating system places that thread in the________state until the lock becomes available.

a) waiting.
b) locked.
c) blocked.
d) None of the above.


c) blocked.

Computer Science & Information Technology

You might also like to view...

Can a role be shared between two or more participants? Why or why not?

What will be an ideal response?

Computer Science & Information Technology

Match each term with the correct statement below.

A. Provides a framework in which to develop user interfaces in a program B. Unites several Web-based, transaction, and message queue communications into a common programming model, enabling applications to communicate with one another efficiently C. Typically software written by programmers within an organization D. Two or more computers that users see as a single computer E. Software applications in which some processing may occur on a client and some on the server; or processing may be split between different applications on the same server or among different servers F. A runtime layer that sits just above the operating system and enables quick program execution, code management, memory management, remote services management, thread execution management, and security enforcement G. Enables you to establish resource policies so that resources can be allocated for different types of application environments H. Software applications run from a server by remote network clients or by other software I. A development environment and runtime engine that helps programmers build applications that more closely follow the actual program or human workflow process

Computer Science & Information Technology

The ____ is the core of the operating system.?

A. ?archive B. ?swap file C. ?kernel D. ?page file

Computer Science & Information Technology

____ is the process in which the identity of an end entity is established and verified.

A. Registration B. Keying material generation C. Certificate creation D. Certificate distribution

Computer Science & Information Technology