× Didn't find what you were looking for? Ask a question
Top Posters
Since Sunday
s
3
3
d
3
s
2
c
2
G
2
y
2
t
2
2
k
2
j
2
e
2
New Topic  
DJ DJ
wrote...
Posts: 772
10 years ago
Which of the following is a technique for controlling access to a critical region?

   A. Spooling   B. Time sharing      C. Semaphore      D. Booting

This is for my computing programming course
Read 827 times
3 Replies

Related Topics

Replies
wrote...
10 years ago
C
DJ Author
wrote...
10 years ago
Perfect, thx.

Computer science has been a killer this semester.
wrote...
9 years ago
My pleasure.
New Topic      
Explore
Post your homework questions and get free online help from our incredible volunteers
  1428 People Browsing
 101 Signed Up Today
Related Images
  
 2866
  
 283
  
 725
Your Opinion