Sample Test 3 Flashcards

1
Q

A set of processes is _________ when each process in the set is blocked awaiting an event that can only be triggered by another blocked process in the set.

A

deadlocked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Examples of __________ include processors, I/O channels, main and secondary memory, devices, and data structures such as files, databases, and semaphores.

A

reusable resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

With _________ only one process may use a resource at a time and no process may access a resource unit that has been allocated to another process.

A

mutual exclusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A closed chain of processes exists, such that each process holds at least one resource needed by the next process in the chain is the condition of __________ .

A

circular wait

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Once the processes have progressed into the __________ , those processes will deadlock.

A

fatal region

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The strategy of deadlock _________ is to design a system in such a way that the possibility of deadlock is excluded.

A

prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The _________ condition can be prevented by requiring that a process request all of its required resources at one time and blocking the process until all requests can be granted simultaneously.

A

hold and wait

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The fastest form of interprocess communication provided in UNIX is __________ .

A

shared memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The __________ condition can be prevented by defining a linear ordering of resource types.

A

circular wait

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Requested resources are granted to processes whenever possible with _________ .

A

deadlock detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

One of the most significant contributions of UNIX to the development of operating systems is the _________ .

A

pipe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A __________ is a software mechanism that informs a process of the occurrence of asynchronous events.

A

signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The most common technique used for protecting a critical section in Linux is the __________ .

A

spinlock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The _________ allows multiple threads to have simultaneous read-only access to an object protected by the lock.

A

readers/writer lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The _________ is useful in sending a signal to a thread indicating that a particular event has occurred.

A

event object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_________ can be defined as the permanent blocking of a set of processes that either compete for system resources or communicate with each other.

A

Deadlock

17
Q

A _________ resource is one that can be safely used by only one process at a time and is not depleted by that use.

A

reusable

18
Q

A _________ resource is one that can be created and destroyed.

A

consumable

19
Q

The _________ is a directed graph that depicts a state of the system of resources and processes, with each process and each resource represented by a node.

A

resource allocation graph

20
Q

Three conditions of policy must be present for a deadlock to be possible: mutual exclusion, no preemption, and _________ .

A

hold and wait

21
Q

Three general approaches exist for dealing with deadlock: prevent, avoid, and __________ .

A

detect

22
Q

__________ allows the three necessary conditions but makes judicious choices to assure that the deadlock point is never reached.

A

Deadlock avoidance

23
Q

The strategy of resource allocation denial is referred to as the ___________ .

A

banker’s algorithm

24
Q

The _________ of the system reflects the current allocation of resources to processes.

A

state

25
Q

_________ strategies are very conservative and solve the problem of deadlock by limiting access to resources and by imposing restrictions on processes.

A

Deadlock prevention

26
Q

Inspired by the concept of co-routines, a _________ is a circular buffer allowing two processes to communicate on the producer-consumer model.

A

pipe

27
Q

Two types of atomic operations are defined in Linux: integer operations and __________ .

A

bitmap operations

28
Q

Linux provides three types of semaphore facilities in the kernel: binary semaphores, counting semaphores, and __________ .

A

reader-writer semaphores

29
Q

An executable entity within a process is a __________ object.

A

thread

30
Q

A program invocation, including the address space and resources required to run the program is a __________ object.

A

process