-
97.
last reply by CpjJwWHV • 14 years ago • asked in Computer Science And Engineering, 2010
View Comments [1 Reply]
-
98.
last reply by CpjJwWHV • 14 years ago • asked in Computer Science And Engineering, 2010
View Comments [3 Reply]
-
99.
last reply by CpjJwWHV • 14 years ago • asked in Computer Science And Engineering, 2010
View Comments [1 Reply]
-
100.
Consider the methods used by processes P1 and P2 for accessing their critical sections whenever needed, as given below. The initial values of shared boolean variables S1 and S2 are randomly assigned.
Method used by P1 Method used by P2 while (S1 = = S2);
Critical Section
S1= S2;while (S1 ! = S2);
Critical Section
S2 = not (S1);
[1 mark]
(A) Mutual exclusion but not progress
(B) Progress but not mutual exclusion
(C) Neither mutual exclusion nor progress
(D) Both mutual exclusion and progress
last reply by CpjJwWHV • 14 years ago • asked in Computer Science And Engineering, 2010
View Comments [2 Reply]
-
101.
What is the appropriate pairing of items in the two columns listing various activities encountered in a software life cycle?
P. Requirements Capture 1. Module Development and Integration Q. Design 2. Domain Analysis R. Implementation 3. Structural and Behavioral Modeling S. Maintenance 4. Performance Tuning
(A) P-3 Q-2 R-4 S-1
(B) P-2 Q-3 R-1 S-4
(C) P-3 Q-2 R-1 S-4
(D) P-2 Q-3 R-4 S-1
last reply by CpjJwWHV • 14 years ago • asked in Computer Science And Engineering, 2010
View Comments [1 Reply]
-
102.
last reply by CpjJwWHV • 14 years ago • asked in Computer Science And Engineering, 2010
View Comments [1 Reply]