Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


One solution for deadlock prevention for dining
philosopher's problem

Answers were Sorted based on User's Feedback



One solution for deadlock prevention for dining philosopher's problem..

Answer / mohamad sultan

we can requier philosopher's to grab both the forks at the same time.

Is This Answer Correct ?    3 Yes 1 No

One solution for deadlock prevention for dining philosopher's problem..

Answer / kalyani

By allowing only 4 members and signaling the 5th person.

Is This Answer Correct ?    13 Yes 12 No

One solution for deadlock prevention for dining philosopher's problem..

Answer / guest

Allow one person to take first left stick and then right stick
and remaining persons in reverse order.

Is This Answer Correct ?    5 Yes 12 No

Post New Answer

More Operating Systems AllOther Interview Questions

What is concurrency go?

0 Answers  


Is 4 cores enough for streaming?

0 Answers  


How To Convert A Normal Vg To Big & Scalable Vg And Also Big To Scalable Vg?

0 Answers   IBM,


Is chrome os better than windows 10?

0 Answers  


What os is used at google?

0 Answers  


What is Cycle Stealing in OS?

0 Answers   Verifone,


Is heap shared between processes?

0 Answers  


Where do I find disk cleanup?

0 Answers  


How do you fix a crashed computer?

0 Answers  


How do I compare files in notepad ++?

0 Answers  


What are compile time Errors?

0 Answers   Akamai Technologies, Impetus, iNautix,


Assuming one link of the Trojan horse copy-and-observe-later chain is broken. There are two other possible angles of attack by Alice: Alice logging on and attempting to read the string directly, and alice assigning a security level of sensitive to the back-pocket file. Does the reference monitor prevent these attacks?

0 Answers  


Categories