Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What is deadlock? How do you avoid it?

Answer Posted / manzoor elahi laskar

A deadlock is a situation in which two computer programs
sharing the same resource are effectively preventing each
other from accessing the resource, resulting in both
programs ceasing to function.
In order for deadlock order to avoid deadlock following
cases must be avoided.

• Mutual exclusion -a resource that cannot be used by
more than one process at a time. (Two processes cannot
simultaneously control the same resource or be in their
critical section).
• Hold and Wait - processes already holding resources
may request new resources
• No preemption - Once a process holds a resource, it
cannot be taken away by another process or the kernel.
• Circular wait - Each process is waiting to obtain a
resource which is held by another process.

Is This Answer Correct ?    50 Yes 11 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What should I consider when buying a laptop?

957


When I startup my computer the screen is black?

905


What's the best operating system?

1035


Where do I find disk cleanup?

934


Explain about memory management in operating system.

1002


what are latest technologies ? and how will keep yourself up to date ?

2870


Is go garbage collected?

947


Explian T - Factor?

1041


What do you know about the latest android version Lollipop?

928


Dear All, When the patches are installed in the server OS, how will we know that which patch is the latest patch?

2187


Assuming one link of the Trojan horse copy-and-observe-later chain is broken. There are two other possible angles of attack by Alice: Alice logging on and attempting to read the string directly, and alice assigning a security level of sensitive to the back-pocket file. Does the reference monitor prevent these attacks?

2783


Is microsoft coming out with a new operating system?

893


What is gnu os?

950


Can I put an ssd in my old computer?

979


Can I close my computer while updating?

1046