Correct Answer : Reader-Writer
Explanation : When you look at the resources involved, you’ll see that the signature of this form of deadlock is locked that are all either a shared (S) lock granted and an exclusive (X) lock requested or an X lock granted and an S lock requested.