Which of the following is not the approach to dealing with deadlock?
A) Prevention
B) Avoidance
C) Detection
D) Deletion

1 Answer

Answer :

D) Deletion

Related questions

Description : Which are the method for handling deadlocks. a. Deadlock prevention b. Deadlock avoidance c. Deadlock detection d. Allof these

Last Answer : d. Allof these

Description : A direct method of deadlock prevention is to prevent the occurrence of ………….. A) Mutual exclusion B) Hold and wait C) Circular waits D) No preemption

Last Answer : C) Circular waits

Description : A direct method of deadlock prevention is to prevent the occurrences of ................... A) Mutual exclusion B) Hold and wait C) Circular waits D) No preemption

Last Answer : C) Circular waits

Description : In the ________ algorithm of TCP, the size of the congestion window increases exponentially until it reaches a threshold A. slow-start B. congestion avoidance C. congestion detection D. none of the above

Last Answer : A. slow-start

Description : Saline osmotic purgatives are used for: A. Treatment of constipation B. Prevention of constipation in patients of piles C. Avoidance of straining at stools in patients of hernia D. Tapeworm infestation: following niclosamide administration

Last Answer : D. Tapeworm infestation: following niclosamide administration

Description : The following conditions of policy must be present for a deadlock to be possible. i) Mutual exclusion ii) Hold and wait iii) No preemption iv) Circular wait A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Last Answer : D) All i, ii, iii and iv

Description : ……………. Can be defined as the permanent blocking of a set of processed that either complete for system resources or communicate with each other. A) Deadlock B) Permanent lock C) Starvation D) Mutual exclusion

Last Answer : A) Deadlock

Description : ………………. Techniques can be used to resolve conflicts, such as competition for resources, and to synchronize processes so that they can cooperate. A) Mutual Exclusion B) Busy Waiting C) Deadlock D) Starvation

Last Answer : A) Mutual Exclusion

Description : …………… is a condition in which there is a set of concurrent processes, only one of which is able to access a given resource or perform a given function at any time. A) Mutual Exclusion B) Busy Waiting C) Deadlock D) Starvation

Last Answer : A) Mutual Exclusion

Description : Simplest way of deadlock recovery is (A) Roll back (B) Preempt resource (C) Lock one of the processes (D) Kill one of the processes

Last Answer : (D) Kill one of the processes

Description : Which of the following concurrency protocol ensures both conflict serializability and freedom from deadlock : I. 2-phase locking II. Time phase ordering (A) Both I & II (B) II only (C) I only (D) Neither I nor II

Last Answer : (B) II only

Description : Which of the following concurrency protocol ensures both conflict serializability and freedom from deadlock ? (a) 2-phase Locking (b) Time stamp - ordering (A) Both (a) and (b) (B) (a) only (C) (b) only (D) Neither (a) nor (b)

Last Answer : (C) (b) only

Description : Consider a system having ‘m’ resources of the same type. These resources are shared by three processes P1, P2 and P3 which have peak demands of 2, 5 and 7 resources respectively. For what value of ‘m’ deadlock will not occur? (A) 70 (B) 14 (C) 13 (D) 7

Last Answer : (B) 14

Description : File management function of the operating system includes i) File creation and deletion ii) Disk scheduling iii) Directory creation iv) Mapping file in secondary storage. A) i, ii and iii only B) i, iii and iv only C) ii, iii and iv only D) All i, ii, iii and iv

Last Answer : B) i, iii and iv only

Description : ……… is not the operation that can be performed on queue. A) Insertion B) Deletion C) Retrieval D) Traversal

Last Answer : D) Traversal

Description : ………………. is not an operation performed on linear list Get More Mcqs from http://www.siteforinfotech.com/p/mcqs.html a) Insertion b) Deletion c) Retrieval d) Traversal A) only a,b and c B) only a and b C) All of the above D) None of the above

Last Answer : D) None of the above

Description : Inserting an item into the stack when stack is not full is called …………. Operation and deletion of item form the stack, when stack is not empty is called ………..operation. A) push, pop B) pop, push

Last Answer : A) push, pop

Description : In ............ allocation method for disk block allocation in a file system, insertion and deletion of blocks in a file is easy. (A) Index (B) Linked (C) Contiguous (D) Bit Map

Last Answer : (B) Linked

Description : Consider an implementation of unsorted single linked list. Suppose it has its representation with a head and a tail pointer (i.e. pointers to the first and last nodes of the linked list). Given the ... the front node of the linked list. (D) Deletion of the last node of the linked list.

Last Answer : (D) Deletion of the last node of the linked list. 

Description : Which of the following is true for computation time in insertion, deletion and finding maximum and minimum element in a sorted array? (1) Insertion-O(1), Deletion-O(1), Maximum-O(1), Minimum-O(1) (2) Insertion-O(1), ... (1), Minimum-O(1) (4) Insertion-O(n), Deletion-O(n), Maximum-O(n), Minimum-O(n)

Last Answer : Answer: 3

Description : Which one is not an appropriate approach to control frost? a. Avoidance b. Reduction of heat loss c. Addition of heat d. Transmittance of control

Last Answer : Avoidance

Description : )Quality costs include : 1. the total of all costs incurred to assure the production and delivery of acceptable products and services.  2. Only costs classified as prevention, detection and ... rework due to defects, customer returns and warranty costs.  4. The expense of upper management

Last Answer : 1. the total of all costs incurred to assure the production and delivery of acceptable products and services.

Description : The probability that an auditor's procedures leading to the conclusion that a material error does not exist in an account balance when, in fact, such error does exist is referred to as a. Prevention risk. b. Detection risk. c. Inherent risk. d. Control risk

Last Answer : Detection risk.

Description : The probability of an auditor's procedures leading to the conclusion that a material error does not exist in an account balance when, in fact, such error does exist is referred to as a. Prevention risk. b. Inherent risk. c. Control risk. d. Detection risk

Last Answer : b

Description : The responsibility for the detection and prevention of noncompliance with laws and regulations rests with a. The auditor b. The client's legal counsel c. The auditor’s legal counsel d. The client management

Last Answer : The client management

Description : Which of the following statements about fraud or error is incorrect? a. The responsibility for the prevention and detection of fraud and error rests with management. b. The auditor should plan and perform ... . The auditor is not and can not be held responsible for the prevention of fraud and error

Last Answer : The likelihood of detecting fraud is ordinarily higher than that of detecting error.

Description : The responsibility for the detection and prevention of errors, fraud and noncompliance with laws and regulations rests with: a. Auditor b. Client's legal counsel c. Internal auditor d. Client management

Last Answer : Client management

Description : Internal auditing relates to an a. Audit which is performed by a practitioner as an independent contractor. b. Audit which is incidentally concerned with the detection and prevention of fraud. c. ... . Audit wherein the auditor should be independent of management both in fact and in mental attitude

Last Answer : Audit which serves the needs of management

Description : . …………………….. is a form of virus explicitly designed to hide itself from detection by antivirus software. A) Stealth virus B) Polymorphic Virus C) Parasitic Virus D) Macro Virus

Last Answer : A) Stealth virus

Description : The ............layer of OSI model can use the trailer of the frame for error detection. A) Physical B) Data link C) Transport D) Presentation

Last Answer : A) Physical

Description : The start and stop bits are used in serial communication for (A) error detection (B) error correction (C) synchronization (D) slowing down the communication

Last Answer : (C) synchronization 

Description : Which one of the following is not a key process area in CMM level 5 ? (A) Defect prevention (B) Process change management (C) Software product engineering (D) Technology change management

Last Answer : (C) Software product engineering

Description : A system approach based on whole land use planning a). Weed eradication b). Weed control c). Weed prevention d). None

Last Answer : d). None

Description : Which of the following statements reflect nursing interventions of a patient with post-polio syndrome? a) Providing care aimed at slowing the loss of strength and maintaining the physical, ... and cold are most appropriate because these patients tend to have strong reactions to medications.

Last Answer : a) Providing care aimed at slowing the loss of strength and maintaining the physical, psychological and social well being of the patient. No specific medical or surgical treatment is available for ... loss of strength and maintaining the physical, psychological and social well being of the patient.

Description : The most effective approach for social workers to follow in dealing with groups of delinquent boys is probably Options: A) To keep them fully occupied e.g., sports B) To concentrate on winning them ... with them D) To provide them with Big Brother heroes among the nicer kids in the neighbour hood

Last Answer : B) To concentrate on winning them as friends before attempting to reform them 

Description : ………………… approach reduces time and effort required for design and lesser risk in database management. A) Single global database B) Top-down approach C) Multiple databases D) None of the above

Last Answer : C) Multiple databases

Description : Merge sort uses a) Divide-and-conquer b) Backtracking c) Heuristic approach d) Greedy approach

Last Answer : a) Divide-and-conquer

Description : A Design concept Refinement is a: (A) Top-down Approach (B) Complementary of Abstraction concept (C) Process of elaboration (D) All of the above

Last Answer : (D) All of the above

Description : Which one of the following statements, related to the requirements phase in Software Engineering, is incorrect ? (A) Requirement validation is one of the activities in the requirements phase. (B) ... . (D) Function points is one of the most commonly used size metric for requirements. 

Last Answer : (C) “Modelling-oriented approach” is one of the methods for specifying the functional specifications. 

Description : Which of the following are facts about a top-down software testing approach? I. Top-down testing typically requires the tester to build method stubs. II. Top-down testing typically requires the tester to build test drivers. (1) only I (2) Only II (3) Both I and II (4) Neither I nor II

Last Answer : (1) only I

Description : Abstraction and encapsulation are fundamental principles that underlie the object oriented approach to software development. What can you say about the following two statements? I. Abstraction allows us to focus on what something ... and II are correct. (3) Only II is correct. (4) Only I is correct.

Last Answer : (1) Neither I nor II is correct.

Description : Dijkstra’s algorithm is based on (1) Divide and conquer paradigm (2) Dynamic Programming (3) Greedy Approach (4) Backtracking paradigm

Last Answer : 3

Description : The Prototyping model of software development is: (1) a reasonable approach when requirements are well-defined. (2) a useful approach when a customer cannot define requirements clearly. (3) the ... projects with large development teams. (4) a risky model that rarely produces a meaningful product.

Last Answer : 1

Description : If Macedonia's current political deadlock led to political destabilization, would Serbia step in?

Last Answer : Not likely, but we like to stick our nose in everything, so….

Description : What is the procedure adopted for resolving deadlock -SST 10th

Last Answer : The Bill goes for assent to the President. If the President returns the Bill for its reconsideration and Parliament repassess it again, the President has to give his assent to the Bill and it is considered as passed.

Description : Prime Minister Attlee’s announcement on February 20, 1947, was attempted to end the deadlock in India and marked the last few months of British Rule. -SST 10th

Last Answer : The Congress and the Muslim League could not work together for long. The Muslim League went on harping on its demand for division of India. Jinnah said, We shall resist anything that militates ... one Government. (iii) Lord Mountbatten was to replace Lord Wavell as the new Viceroy of India.

Description : What is deadlock what is starvation How do they differ from each other?

Last Answer : A deadlock occurs when two (or more) threads have created a situation where they are all blocking each other. ... Starvation occurs when a scheduler process (i.e. the operating system) refuses to give a particular thread any quantity of a particular resource (generally CPU).

Description : In the case of deadlock between the two houses paraliament, the joint sitting is presided over by the: (1) President (2) Senior most member of Lok Sabha (3) Speaker of Lok Sabha (4) Vice President

Last Answer : (3) Speaker of Lok Sabha Explanation: Article 108 of Indian Constitution prescribes the procedure for resolving a conflict between the two Houses of Parliament over a Bill through a joint sitting' of both ... is presided over by the Speaker who is assisted by the Secretary-General of the Lok Sabha.