Chap 6 Flashcards

1
Q

Deadlock is permanent because none of the events is ever triggered.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

All deadlocks involve conflicting needs for resources by two or more processes.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Interrupts, signals, messages, and information in I/O buffers are all examples of reusable resources.

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A useful tool in characterizing the allocation of resources to processes is the resource allocation graph.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

For deadlock to occur, there must not only be a fatal region, but also a sequence of resource requests that has led into the fatal region.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An indirect method of deadlock prevention is to prevent the occurrence of a circular wait.

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

If access to a resource requires mutual exclusion then mutual exclusion must be supported by the OS.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The OS may preempt the second process and require it to release its resources if a process requests a resource that is currently held by another process.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Deadlock avoidance requires knowledge of future process resource requests.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An unsafe state is one in which there is at least one sequence of resource allocations to processes that does not result in a deadlock.

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An atomic operation executes without interruption and without interference.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Deadlock avoidance is more restrictive than deadlock prevention.

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The dining philosopher’s problem can be representative of problems dealing with the coordination of shared resources which may occur when an application includes concurrent threads of execution.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A signal is similar to a hardware interrupt but does not employ priorities.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A mutex is used to ensure that only one thread at a time can access the resource protected by the mutex.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A set of processes is _________ when each process in the set is blocked awaiting an event that can only be triggered by another blocked process in the set.

A

deadlocked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Examples of _______ include processors, I/O channels, main and secondary memory, devices, and data structures such as files, databases, and semaphores.

A

reusable resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

With _______ only one process may use a resource at a time and no process may access a resource unit that has been allocated to another process.

A

mutual exclusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A closed chain of processes exists, such that each process holds at least one resource needed by the next process in the chain is the condition of __________.

A

circular wait

20
Q

Once the processes have progressed into the _________, those processes will deadlock.

A

fatal region

21
Q

The strategy of deadlock __________ is to design a system in such a way that the possibility of deadlock is excluded.

A

prevention

22
Q

The __________ condition can be prevented by requiring that a process request all of its required resources at one time and blocking the process until all requests can be granted simultaneously.

A

hold and wait

23
Q

The fastest form of interprocess communication provided in UNIX is _____________.

A

shared memory

24
Q

The ____________ condition can be prevented by defining a linear ordering of resource types.

A

circular wait

25
Requested resources are granted to processes whenever possible with ____________.
deadlock detection
26
One of the most significant contributions of UNIX to the development of operating systems is the ___________.
pipe
27
A _________ is a software mechanism that informs a process of the occurrence of asynchronous events.
signal
28
The most common technique used for protecting a critical section in Linux is the ____________.
spinlock
29
The __________ allows multiple threads to have simultaneous read-only access to an object protected by the lock.
readers/writer lock
30
The ___________ is useful in sending a signal to a thread indicating that a particular event has occurred.
event object
31
_________ can be defined as the permanent blocking of a set of processes that either compete for system resources or communicate with each other.
deadlock
32
A ______ resource is one that can be safely used by only one process at a time and is not depleted by that use.
reusable
33
A ________ resource is one that can be created and destroyed.
consumable
34
The ________ is a directed graph that depicts a state of the system of resources and processes, with each process and each resource represented by a node.
resource allocation graph
35
Three conditions of policy must be present for a deadlock to be possible: mutual exclusion, no preemption, and ________.
hold and wait
36
Three general approaches exist for dealing with deadlock: prevent, avoid, and ______.
detect
37
_________ allows the three necessary conditions but makes judicious choices to assure that the deadlock point is never reached.
avoidance
38
The strategy of resource allocation denial is referred to as the ___________.
banker's algorithm
39
The ________ of the system reflects the current allocation of resources to processes.
state
40
________ strategies are very conservative and solve the problem of deadlock by limiting access to resources and by imposing restrictions on processes.
prevention
41
Inspired by the concept of co-routines, a ________ is a circular buffer allowing two processes to communicate on the producer-consumer model.
pipe
42
Two types of atomic operations are defined in Linux: integer operations and _______________.
bitmap operations
43
Linux provides three types of semaphore facilities in the kernel: binary semaphores, counting semaphores, and ________.
reader-writer semaphores
44
an executable entity within a process is a _________ object.
thread
45
A program invocation, including the address space and resources required to run the program is a ______ object.
process