To protect data shared between user contexts and software interrupt handlers, the kernel uses ________ spin locks.
a) bottom-half
b) top-half
c) reader/writer
d) seqlock
a) bottom-half
Computer Science & Information Technology
You might also like to view...
Computers have two classifications for numbers: those that are used for ____ and those that are not.
A. coding B. storing C. calculations D. processing
Computer Science & Information Technology
The cross-over point is:
A. the point at which an algorithm crosses over from being fast to being slow B. the point at which n crosses over from being small to being large C. the point at which the graphs of the instruction functions of two algorithms intersect D. the point at which n intersects with time
Computer Science & Information Technology