1.Use a protocol to ensure that the system will never enter a deadlock state.
2.Allow the system to enter the deadlock state and then recover.
3.Pretend that deadlocks never occur in the system.
4. All of the Above
Answer:4