A ________ is a variable that governs access to critical sections.
a) primitive
b) lock
c) controller
d) flag
b) lock
Computer Science & Information Technology
You might also like to view...
Case-Based Critical Thinking QuestionsCase 7-1Robert is a medical writer for a pharmaceutical company. The company allows Robert to work from home. Robert's job is a(n) ____ job.
A. telemarketing B. telecommuting C. videoconferencing D. e-working
Computer Science & Information Technology
Match the protocol or encryption name with the feature.
A. No longer considered secure because the key used for encryption doesn’t change. B. Typically uses TKIP for encryption. C. Typically uses AES for encryption. D. Generates a different key for every transmission; however, the encryption algorithm used for its calculations is no longer considered secure. E. Current encryption algorithm used today.
Computer Science & Information Technology