To protect data shared between user contexts and software interrupt handlers, the kernel uses ________ spin locks.

a) bottom-half
b) top-half
c) reader/writer
d) seqlock

a) bottom-half

Computer Science & Information Technology

You might also like to view...

Computers have two classifications for numbers: those that are used for ____ and those that are not.

A. coding B. storing C. calculations D. processing

Computer Science & Information Technology

The cross-over point is:

A. the point at which an algorithm crosses over from being fast to being slow B. the point at which n crosses over from being small to being large C. the point at which the graphs of the instruction functions of two algorithms intersect D. the point at which n intersects with time

Computer Science & Information Technology