Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What is a semaphore?

Answer Posted / swetcha

Semaphores r software, blocking, OS assistance solution to
the mutual exclusion problem .It is
basically a non-negative integer variable that saves the
number of wakeup signals sent so they are not lost if the
process is not sleeping

another interpretation is that the semaphore value
represents the number of resources available

Is This Answer Correct ?    101 Yes 34 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

How do you crash a computer?

1069


Do simultaneous downloads take longer?

1002


Can a laptop have both ssd and hdd?

1133


Assuming feedback to the adversary flugging an error as each incorrect character is entered, what is the expected time to discover the correct password?

3377


What is the name of first operating system?

981


1) What is an Virtual memory? 2) How do we test API's in both Windows/Linux/Unix? 3) What is an IOCTL? 4) How do you open a char device through API's? 5) What is major num/ minor num? 6) What is the max num for minor num? 7) Who gives you the major / minor numbers? 8) Reverse a string using recursive func. 9) fork/vfork/clone. 10) What does fork returns? 11) What is a zombie process? 12) What happens when a child completes before parent tries to wait for it? 13) Interrupt handlers, top-hdnl....?

2516


Can I put an ssd in my old computer?

1045


What are go channels?

1018


What is the difference between wget and curl?

1232


Is system restore bad for your computer?

1031


What is the difference between kernel and operating system?

992


How many goroutines are in a core?

1018


Assuming one link of the Trojan horse copy-and-observe-later chain is broken. There are two other possible angles of attack by Alice: Alice logging on and attempting to read the string directly, and alice assigning a security level of sensitive to the back-pocket file. Does the reference monitor prevent these attacks?

2870


What is the difference between concurrency and parallelism?

1053


Why is android better than ios?

1028