two disjoint processes that do not interact
processes that share resources
processes that do not use the same resource
none of these
It provides a solution to the problem of preventing indefinite lockout.
It may result in interleaved access to a file by two or more clients.
It will guarantee mutual exclusion.
It will fail to guarantee the prevention of indefinite lockout
3 V operations
3 P operations
5 V operations and 2 P operations
None of these
22
18
15
13
are legitimate programs that allow unauthorized access
are hacker programs that do not show up on the system
really do not usually work
usually are immediately discovered