Priority inversion is solved by use of _____________
(a) priority inheritance protocol
(b) two phase lock protocol
(c) time protocol
(d) all of the mentioned
The question was asked in semester exam.
The doubt is from Real Time System topic in section Real Time Operating Systems(RTOS) of Operating System