What is the best action a system can take when deadlock is
detected
Answers were Sorted based on User's Feedback
Answer / nadeem khokhar
system checks for the priority. if a lower priority process is holding the resource and more priority process is in waiting, it frees the resource from low priority process and gives it to the higher priority process.
or it can also go for that if a process is not leaving the resource and other is in wait state then it checks the time quantum, if time quantum exceeds from the predefined time quantum it takes the resource and give it to the next process and same action repeated
| Is This Answer Correct ? | 8 Yes | 0 No |
Answer / devendra singh
dedloc is condition lock relised from dedloc condition
| Is This Answer Correct ? | 2 Yes | 6 No |
hii I inntrested abt scjp certification but i dont knw abt scjp plz send details abt scjp exam and syllabus.
Write a program to find duplicate number from array in minimum time complexity.
Diffrence between 2.0,3.0,3.5,4.0. versions of .net?
what is the difference between "types" and "data" in abap.
WAP to print all prime nos between 1 to 100 without using user input...pls reply within few hours...
How to find out the user exit for va01.
how can i split string in a textbox in windows appication using C#.net
what is the difference between primary key and unique key?
two MIT math grads bump into each other at Fairway on the upper west side. they haven't seen each other in over 20 years. the first grad says to the second: "how have you been?" second: "great! i got married and i have three daughters now" first: "really? how old are they?" second: "well, the product of their ages is 72, and the sum of their ages is the same as the number on that building over there.." first: "right, ok.. oh wait.. hmm, i still don't know" second: "oh sorry, the oldest one just started to play the piano" first: "wonderful! my oldest is the same age!" problem: how old are the daughters?
What is the Difference between in memory database and physical database
Number of null pointers in any binary tree
When we use Windows authentication mode