205 views

Please log in or register to answer this question.

Related questions

0 votes
0 votes
1 answer
1
Shivateja MST asked Jul 13, 2023
183 views
Like other allocation techniques, does Overlaying technique uses MMU? And how address translation takes place and security is maintained in Overlaying ?
2 votes
2 votes
2 answers
2
Sunnidhya Roy asked Dec 30, 2022
676 views
Can Safe state in DeadLock Avoidance Mechanism always guarantee No DeadLock??