necessary conditions for a deadlock , Operating System

Q) a. Given that the first three necessary conditions for a deadlock are in place, comment on the feasibility of the following strategy. All processes are given  unique priorities. When more than one process is waiting for a resource and  the resource becomes available, allocate the resource to the waiting process with the highest priority.

b. Would the support of user-level threads change your answer for part a? Explain.

Posted Date: 3/15/2013 6:24:29 AM | Location : United States







Related Discussions:- necessary conditions for a deadlock , Assignment Help, Ask Question on necessary conditions for a deadlock , Get Answer, Expert's Help, necessary conditions for a deadlock Discussions

Write discussion on necessary conditions for a deadlock
Your posts are moderated
Related Questions
What is an acyclic graph? A tree that has been corrupted by links to other branches, but does not have any cyclic paths in it.

Scalability : Scalability is the competence of the system to adapt to increased service load. A scalable system will respond more gracefully to increased load than a non-sc

When we download a movie from the Internet, we don't care about, say, packet sizes. However, even ifwe are not aware of howlow-level details of networks are implemented, our data i

What is busy waiting? When strict alteration is done there may take place situation like two processes setting their flag as true. Therefore both of the processes have equal pr

Ask questiWhat is dispatcheron #Minimum 100 words accepted#

advantage and dis advantage of threads


Define the Executor (Worker Thread)  The responsibility of the Executor (or Worker Threads) is to execute instructions on behalf of a client-server connection. The Executor mus

Q. Name two differences between logical and physical addresses? Answer: A logical address doesn't refer to an actual existing address rather it refers to an abstract address in

Q. Explain the File-system manipulation? File-system manipulation there is several details in file allocation, creation, deletion and naming that users should not have to perfo