Chap 6 Flashcards

1
Q

Deadlock is permanent because none of the events is ever triggered.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

All deadlocks involve conflicting needs for resources by two or more processes.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Interrupts, signals, messages, and information in I/O buffers are all examples of reusable resources.

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A useful tool in characterizing the allocation of resources to processes is the resource allocation graph.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

For deadlock to occur, there must not only be a fatal region, but also a sequence of resource requests that has led into the fatal region.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An indirect method of deadlock prevention is to prevent the occurrence of a circular wait.

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

If access to a resource requires mutual exclusion then mutual exclusion must be supported by the OS.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The OS may preempt the second process and require it to release its resources if a process requests a resource that is currently held by another process.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Deadlock avoidance requires knowledge of future process resource requests.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An unsafe state is one in which there is at least one sequence of resource allocations to processes that does not result in a deadlock.

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An atomic operation executes without interruption and without interference.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Deadlock avoidance is more restrictive than deadlock prevention.

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The dining philosopher’s problem can be representative of problems dealing with the coordination of shared resources which may occur when an application includes concurrent threads of execution.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A signal is similar to a hardware interrupt but does not employ priorities.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A mutex is used to ensure that only one thread at a time can access the resource protected by the mutex.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A set of processes is _________ when each process in the set is blocked awaiting an event that can only be triggered by another blocked process in the set.

A

deadlocked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Examples of _______ include processors, I/O channels, main and secondary memory, devices, and data structures such as files, databases, and semaphores.

A

reusable resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

With _______ only one process may use a resource at a time and no process may access a resource unit that has been allocated to another process.

A

mutual exclusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A closed chain of processes exists, such that each process holds at least one resource needed by the next process in the chain is the condition of __________.

A

circular wait

20
Q

Once the processes have progressed into the _________, those processes will deadlock.

A

fatal region

21
Q

The strategy of deadlock __________ is to design a system in such a way that the possibility of deadlock is excluded.

A

prevention

22
Q

The __________ condition can be prevented by requiring that a process request all of its required resources at one time and blocking the process until all requests can be granted simultaneously.

A

hold and wait

23
Q

The fastest form of interprocess communication provided in UNIX is _____________.

A

shared memory

24
Q

The ____________ condition can be prevented by defining a linear ordering of resource types.

A

circular wait

25
Q

Requested resources are granted to processes whenever possible with ____________.

A

deadlock detection

26
Q

One of the most significant contributions of UNIX to the development of operating systems is the ___________.

A

pipe

27
Q

A _________ is a software mechanism that informs a process of the occurrence of asynchronous events.

A

signal

28
Q

The most common technique used for protecting a critical section in Linux is the ____________.

A

spinlock

29
Q

The __________ allows multiple threads to have simultaneous read-only access to an object protected by the lock.

A

readers/writer lock

30
Q

The ___________ is useful in sending a signal to a thread indicating that a particular event has occurred.

A

event object

31
Q

_________ can be defined as the permanent blocking of a set of processes that either compete for system resources or communicate with each other.

A

deadlock

32
Q

A ______ resource is one that can be safely used by only one process at a time and is not depleted by that use.

A

reusable

33
Q

A ________ resource is one that can be created and destroyed.

A

consumable

34
Q

The ________ is a directed graph that depicts a state of the system of resources and processes, with each process and each resource represented by a node.

A

resource allocation graph

35
Q

Three conditions of policy must be present for a deadlock to be possible: mutual exclusion, no preemption, and ________.

A

hold and wait

36
Q

Three general approaches exist for dealing with deadlock: prevent, avoid, and ______.

A

detect

37
Q

_________ allows the three necessary conditions but makes judicious choices to assure that the deadlock point is never reached.

A

avoidance

38
Q

The strategy of resource allocation denial is referred to as the ___________.

A

banker’s algorithm

39
Q

The ________ of the system reflects the current allocation of resources to processes.

A

state

40
Q

________ strategies are very conservative and solve the problem of deadlock by limiting access to resources and by imposing restrictions on processes.

A

prevention

41
Q

Inspired by the concept of co-routines, a ________ is a circular buffer allowing two processes to communicate on the producer-consumer model.

A

pipe

42
Q

Two types of atomic operations are defined in Linux: integer operations and _______________.

A

bitmap operations

43
Q

Linux provides three types of semaphore facilities in the kernel: binary semaphores, counting semaphores, and ________.

A

reader-writer semaphores

44
Q

an executable entity within a process is a _________ object.

A

thread

45
Q

A program invocation, including the address space and resources required to run the program is a ______ object.

A

process