Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What is a semaphore?

Answer Posted / aditya singh

In programming, especially in Unix systems, semaphores are a
technique for coordinating or synchronizing activities in
which multiple processes compete for the same operating
system resources. A semaphore is a value in a designated
place in operating system (or kernel) storage that each
process can check and then change. Depending on the value
that is found, the process can use the resource or will find
that it is already in use and must wait for some period
before trying again. Semaphores can be binary (0 or 1) or
can have additional values. Typically, a process using
semaphores checks the value and then, if it using the
resource, changes the value to reflect this so that
subsequent semaphore users will know to wait.

Semaphores are commonly use for two purposes: to share a
common memory space and to share access to files. Semaphores
are one of the techniques for interprocess communication
(IPC). The C programming language provides a set of
interfaces or "functions" for managing semaphores.

Is This Answer Correct ?    1 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Where do I find disk cleanup?

952


what is ms configure?

2138


What are go channels?

971


Assuming one link of the Trojan horse copy-and-observe-later chain is broken. There are two other possible angles of attack by Alice: Alice logging on and attempting to read the string directly, and alice assigning a security level of sensitive to the back-pocket file. Does the reference monitor prevent these attacks?

2815


Difference Between Jfs & Jfs2?

1040


What is the meaning of slosh login in nfs?

2582


What is the first operating system in the world?

1011


What's the best operating system?

1056


Is deepin os stable?

1009


What is the most powerful computer in the world 2019?

972


What happens when I reset my computer?

1038


What Command To Take Backup Other Vg's?

1048


What should I consider when buying a laptop?

983


What is the difference between concurrency and parallelism?

997


Can I restore my computer to yesterday?

972