A ________ is a variable that governs access to critical sections.

a) primitive
b) lock
c) controller
d) flag

b) lock

Computer Science & Information Technology

You might also like to view...

Case-Based Critical Thinking QuestionsCase 7-1Robert is a medical writer for a pharmaceutical company. The company allows Robert to work from home. Robert's job is a(n) ____ job.

A. telemarketing B. telecommuting C. videoconferencing D. e-working

Computer Science & Information Technology

Match the protocol or encryption name with the feature.

A. No longer considered secure because the key used for encryption doesn’t change. B. Typically uses TKIP for encryption. C. Typically uses AES for encryption. D. Generates a different key for every transmission; however, the encryption algorithm used for its calculations is no longer considered secure. E. Current encryption algorithm used today.

Computer Science & Information Technology