Sample Test 3 Flashcards

1
Q

A set of processes is _________ when each process in the set is blocked awaiting an event that can only be triggered by another blocked process in the set.

A

deadlocked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Examples of __________ include processors, I/O channels, main and secondary memory, devices, and data structures such as files, databases, and semaphores.

A

reusable resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

With _________ only one process may use a resource at a time and no process may access a resource unit that has been allocated to another process.

A

mutual exclusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A closed chain of processes exists, such that each process holds at least one resource needed by the next process in the chain is the condition of __________ .

A

circular wait

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Once the processes have progressed into the __________ , those processes will deadlock.

A

fatal region

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The strategy of deadlock _________ is to design a system in such a way that the possibility of deadlock is excluded.

A

prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The _________ condition can be prevented by requiring that a process request all of its required resources at one time and blocking the process until all requests can be granted simultaneously.

A

hold and wait

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The fastest form of interprocess communication provided in UNIX is __________ .

A

shared memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The __________ condition can be prevented by defining a linear ordering of resource types.

A

circular wait

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Requested resources are granted to processes whenever possible with _________ .

A

deadlock detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

One of the most significant contributions of UNIX to the development of operating systems is the _________ .

A

pipe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A __________ is a software mechanism that informs a process of the occurrence of asynchronous events.

A

signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The most common technique used for protecting a critical section in Linux is the __________ .

A

spinlock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The _________ allows multiple threads to have simultaneous read-only access to an object protected by the lock.

A

readers/writer lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The _________ is useful in sending a signal to a thread indicating that a particular event has occurred.

A

event object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_________ can be defined as the permanent blocking of a set of processes that either compete for system resources or communicate with each other.

17
Q

A _________ resource is one that can be safely used by only one process at a time and is not depleted by that use.

18
Q

A _________ resource is one that can be created and destroyed.

A

consumable

19
Q

The _________ is a directed graph that depicts a state of the system of resources and processes, with each process and each resource represented by a node.

A

resource allocation graph

20
Q

Three conditions of policy must be present for a deadlock to be possible: mutual exclusion, no preemption, and _________ .

A

hold and wait

21
Q

Three general approaches exist for dealing with deadlock: prevent, avoid, and __________ .

22
Q

__________ allows the three necessary conditions but makes judicious choices to assure that the deadlock point is never reached.

A

Deadlock avoidance

23
Q

The strategy of resource allocation denial is referred to as the ___________ .

A

banker’s algorithm

24
Q

The _________ of the system reflects the current allocation of resources to processes.

25
_________ strategies are very conservative and solve the problem of deadlock by limiting access to resources and by imposing restrictions on processes.
Deadlock prevention
26
Inspired by the concept of co-routines, a _________ is a circular buffer allowing two processes to communicate on the producer-consumer model.
pipe
27
Two types of atomic operations are defined in Linux: integer operations and __________ .
bitmap operations
28
Linux provides three types of semaphore facilities in the kernel: binary semaphores, counting semaphores, and __________ .
reader-writer semaphores
29
An executable entity within a process is a __________ object.
thread
30
A program invocation, including the address space and resources required to run the program is a __________ object.
process