logo

CuriousTab

CuriousTab

Discussion


Home Computer Science Operating Systems Concepts See What Others Are Saying!
  • Question
  • For how many processes which are sharing common data, the Dekker's algorithm implements mutual exclusion?


  • Options
  • A. 1
  • B. 2
  • C. 3
  • D. 4
  • E. None of the above

  • Correct Answer


  • Explanation
    Dekker's algorithm is the first known correct solution to the mutual exclusion problem in concurrent programming. The solution is attributed to Dutch mathematician Th. J. Dekker by Edsger W. Dijkstra in his manuscript on cooperating sequential processes. It allows two threads to share a single-use resource without conflict, using only shared memory for communication.

    It avoids the strict alternation of a naive turn-taking algorithm, and was one of the first mutual exclusion algorithms to be invented.

    Source: http://en.wikipedia.org/wiki/Dekker's_algorithm


    More questions

    • 1. In which mode can two or more applications be stored in memory at the same time?

    • Options
    • A. Segmented Mode
    • B. Unprotected Mode
    • C. Real Mode
    • D. Protected Mode
    • E. None of the above
    • Discuss
    • 2. What kind of capability is required if one plans to interface with a plotter or printer?

    • Options
    • A. A graphics cable
    • B. RGB monitor
    • C. A graphics board
    • D. A co-processor
    • E. None of the above
    • Discuss
    • 3. The digitizing technology that uses an electric field radiated from the tablet and picked up by a cursor is:

    • Options
    • A. electromagnetic
    • B. raster
    • C. sonic
    • D. electrostic
    • E. None of the above
    • Discuss
    • 4. A microcomputer is a computer that uses a _____ for its CPU.

    • Options
    • A. chips
    • B. registers
    • C. microprocessor
    • D. vacuum tube
    • E. None of the above
    • Discuss
    • 5. Redirection redirects

    • Options
    • A. a stream from a file to the screen
    • B. a file from a device to a stream
    • C. a device from the screen to a file
    • D. the screen from a device to a stream
    • Discuss
    • 6. The commonly used UNIX commands like date, ls, cat, etc. are stored in

    • Options
    • A. /dev directory
    • B. /bin and /usr/bin directories
    • C. /tmp directory
    • D. /unix directory
    • E. None of the above
    • Discuss
    • 7. A quotation system obtains potential delivery time data from the

    • Options
    • A. production schedule file
    • B. inventory file
    • C. product catalog file
    • D. All of the above
    • E. None of the above
    • Discuss
    • 8. Which of the following is considered a high-level language?

    • Options
    • A. Machine language
    • B. FORTRAN
    • C. Assembly language
    • D. All of the above
    • E. None of the above
    • Discuss
    • 9. You have a network ID of 134.57.0.0 and you need to divide it into multiple subnets in which at least 600 host IDs for each subnet are available. You desire to have the largest amount of subnets available. Which subnet mask should you assign?

    • Options
    • A. 255.255.224.0
    • B. 255.255.240.0
    • C. 255.255.248.0
    • D. 255.255.255.0
    • E. 255.255.255.255
    • Discuss
    • 10. System Implementation Phase entails

    • Options
    • A. System check outs
    • B. Pilot run
    • C. Parallel runs
    • D. All of the above
    • E. None of the above
    • Discuss


    Comments

    There are no comments.

Enter a new Comment