Exam 6: Synchronization Tools

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following statements is true?

(Multiple Choice)
4.9/5
(30)

Mutex locks and counting semaphores are essentially the same thing.

(True/False)
4.8/5
(31)

Assume you had a function named update() that updates shared data. Illustrate how a mutex lock named mutex might be used to prevent a race condition in update().

(Essay)
4.7/5
(34)

Which of the following is not true about test_and_set instruction?

(Multiple Choice)
4.8/5
(40)

Which of the following is not true about compare_and_swap instruction?

(Multiple Choice)
4.9/5
(34)

Explain what race condition is.

(Essay)
4.9/5
(30)

Semaphores and mutex locks both provide mutual exclusion.

(True/False)
4.8/5
(39)

Under which of the following contention loads does traditional synchronization become faster than CAS-based synchronization?

(Multiple Choice)
4.9/5
(36)

Which of the following regarding mutex lock is NOT true?

(Multiple Choice)
4.8/5
(35)

Which of the following is NOT true for Peterson's solution?

(Multiple Choice)
5.0/5
(32)

When mutex lock is implemented as a binary semaphore, what should its value be initialized to be?

(Multiple Choice)
4.8/5
(45)

What is the difference between semaphore and mutex lock?

(Essay)
4.8/5
(31)

Which of the following is true?

(Multiple Choice)
4.8/5
(28)

Explain what busy waiting is.

(Essay)
4.9/5
(32)

What is the correct order of operations for protecting a critical section using a binary semaphore?

(Multiple Choice)
5.0/5
(40)

In _________, the process may be changing common variables, updating a table, writing a file, and so on.

(Multiple Choice)
4.9/5
(37)

The preemptive kernel may be more responsive than non-preemptive kernel.

(True/False)
4.8/5
(30)

Semaphore implementation overcomes the busy waiting problem.

(True/False)
4.7/5
(39)

In _________, the process requests permission to access and modify variables shared with others.

(Multiple Choice)
4.8/5
(33)

Explain two general approaches to handle critical sections in operating systems.

(Essay)
4.7/5
(34)
Showing 21 - 40 of 61
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)