CDS3001-3

CDS3001-3

University

10 Qs

quiz-placeholder

Similar activities

Computer Security

Computer Security

University

10 Qs

Operating System -Quiz-1

Operating System -Quiz-1

University

10 Qs

Data Structures: Linked Lists and Hashtables

Data Structures: Linked Lists and Hashtables

11th Grade - University

14 Qs

Workshop_1

Workshop_1

University

11 Qs

Algorithm analysis: divide & conquer theory

Algorithm analysis: divide & conquer theory

University

10 Qs

Information systems concepts

Information systems concepts

University

10 Qs

Bab 2 | Latihan Pengukuhan II

Bab 2 | Latihan Pengukuhan II

12th Grade - University

10 Qs

4.6.4 Logic Gates

4.6.4 Logic Gates

10th Grade - Professional Development

15 Qs

CDS3001-3

CDS3001-3

Assessment

Quiz

Computers

University

Hard

Created by

Ganesan 100377

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

  1. 1. What is the characteristics of atomicity?

Use communication links.

One processor as coordinator which handles all requests.

All operations associated are executed to completion or none are performed.

When responses are received from all processes, then process can enter its CS.

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

  1. 2. Most of the web applications are usign ________ architecture.

Master-slave

Two-tier

Three-tier

Peer-to-Peer

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

  1. 3. The request and release of resources are ___________

command line statements

interrupts

system calls

special programs

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

  1. 4. Which of the following is not a valid deadlock prevention scheme?

Request and all required resources be allocated before execution.

Never request a resource after releasing any resource.

Number the resources uniquely and never request a lower numbered resource than the last one requested.

Release all resources before requesting a new resource.

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

  1. 5. Which of the following is true with respect to deadlock avoidance?

The Bakery algorithm is used to deal with deadlock avoidane.

When a process is created in a deadlock, it must declare its minimum claim.

The avoidance strategy depends on additional information about short-term resource needs.

With the deadlock avoidance approach, the system is always kept in a safe state.

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

  1. 6. Which one of the following is the deadlock avoidance algorithm?

Round-robin

Banker’s

Elevator

Karn’s

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

  1. 7. Which of the following condition is required for a deadlock to be possible?

Mutual Exclusion

A process may hold allocated resources while awaiting assignment of other resources.

No resources can be forciby removed from a process holding it.

All of the above

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?