首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Sometimes the processes in which people are engaged are dependent upon other processes being completed first, possibly by other
Sometimes the processes in which people are engaged are dependent upon other processes being completed first, possibly by other
admin
2009-02-15
117
问题
Sometimes the processes in which people are engaged are dependent upon other processes being completed first, possibly by other people. For example, on an automobile(71), it is necessary for the body to be constructed before the doors can be added on. Attempting to add the doors first would be pointless, because there would be nowhere to attach them. Thus, if there is no body ready to have doors added, the process for adding doors has to be(72)until the process for creating the next body is complete. This is known as(73)
Obviously, there are many cases where people have to wait for other people to do something. However, if everyone in such a situation is waiting for someone else to do something first, then no one will ever be able to do anything. When discussing processes, this situation is known as(74), because all of the involved processes are effectively dead because of locks they have on resources. Usually someone in such a situation will eventually notice and abort the process, allowing normal flow to(75), and often warning signs can even be spotted ahead of time to avoid ’it in the first place.
选项
A、begin
B、resume
C、presume
D、take back
答案
B
解析
resume恢复,重新占用
转载请注明原文地址:https://kaotiyun.com/show/qeUZ777K
本试题收录于:
数据库系统工程师上午基础知识考试题库软考中级分类
0
数据库系统工程师上午基础知识考试
软考中级
相关试题推荐
作为项目管理师,某个项目可能对你很重要,例如,如果这个项目一旦成功,则公司会很器重你,但如果一旦失败,你将失业。在这个项目中,你想成功的话,就必须最大限度地控制项目的资源。那么,应该为该项目确定(10)组织模式。
在距离矢量路由协议中,(63)可以防止路由循环。
3DES在DES的基础上,使用两个56位的密钥K1和K2,发送方用K1加密,K2解密,再用K1加密。接收方用K1解密,K2加密,再用K1解密,这相当于使用(12)倍于DES的密钥长度的加密效果。
将双绞线制作成交叉线(一端按ELA/TIA568A线序,另一端按ELA/TIA568B线序),该双绞线连接的两个设备可为(32)。
通常,大型及复杂项目的管理模式以间接管理为主。以下关于“间接管理”的描述中,正确的是(67)。
项目范围是否完成和产品范围是否完成分别以(23)作为衡量标准。
通常将“C:\Windows\myprogram.exe”文件设置成只读和隐藏属性,以便控制用户对该文件的访问,这一级安全管理称之为(4)安全管理。
定义完原始分析模型后,需要在软件体系结构环境中标识和描述构件。这些构件主要来源不包含(28)。
极限编程(eXtremeProgramming)是一种轻晕级软件开发方法,它是以(30)为规则的。
The(64)ProcessGroupconsistsoftheprocessesusedtocompletetheworkdefinedintheprojectmanagementplantoaccomplishth
随机试题
保税货物
与蛋白质载体结合后具有免疫原性的物质是
顿咳的表现特点是
根据《招标投标法》的有关规定,下列工程必须公开招标()。
限于对铝保护,应有中性环境要求的电力电缆是()。
韦斯勒总结的不合理信念的三个特征是()
Aujourd"hui______administrativeestdevenuetroplourdepourfairefaceàdesproblèmesdeplusenplusnombreuxetcomplexes.
Preemptiverightisthestockholder’sright______.
Cloningshakesusalltoourverysouls.Forhumanstoconsiderthecloningofoneanotherforcesthemalltoquestionthevery
回归
最新回复
(
0
)