1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tamaranim1 [39]
2 years ago
6

Budgeting for a Computer

Computers and Technology
1 answer:
PilotLPTM [1.2K]2 years ago
7 0

Answer:

Use a credit card to pay for it now.

Explanation:

The computer will help you cut on cost which you incur when having other people do for you simple c computing jobs. For example, typing, editing and proofreading documents. Additionally, it is possible to do some online tasks and get paid. So you'll save much more than you'll spend when having other people do for you the computing jobs or assignments

You might be interested in
What would happen if your computer was infected with the virus or if your network went down?
tatuchka [14]

Your computer will programs more slowly, when you go to an anti-virus software, for some, it will block you from allowing you to access the application. Your information may be stripped from your computer, allowing the infection to take your personal identity and money.

5 0
3 years ago
Read 2 more answers
You create a storyboard at the _____ stage of web development
ddd [48]

Answer:

initial stage of web development.

4 0
3 years ago
Read 2 more answers
When a security administrator wants to conduct regular test on the strength of user passwords, what may be the best setup for th
wariber [46]
I think it’s letter c
4 0
3 years ago
Illustrate that the system is in a safe state by demonstrating an order in which the threads may complete.If a request from thre
Kamila [148]

Answer:

a. safe sequence is T2 , T3, T0, T1, T4.

b. As request(T4) = Available, so the request can be granted immediately

c. As request(T2) < Available, so the request can be granted immediately

d. As request(T3) < Available, so the request can be granted immediately.

Explanation:

It will require matrix

[i, j] = Max [i, j] – Allocation [i, j]

A B C D

T0 3 3 3 2

T1 2 1 3 0

T2 0 1 2 0

T3 2 2 2 2

T4 3 4 5 4

Available = (2 2 2 4)

1. Need(T2) < Available so, T2 can take all resources

Available = (2 2 2 4) + (2 4 1 3) (Allocation of T2) = (4 6 3 7)

2. Need(T3)<Available so, T3 will go next

Available = (4 6 3 7) + (4 1 1 0) = (8 7 4 7)

Like wise next T0, T1, T4 will get resources.

So safe sequence is T2 , T3, T0, T1, T4.

(Note, there may be more than one safe sequence).

Solution b.

Request from T4 is (2 2 2 4) and Available is (2 2 2 4)

As request(T4) = Available, so the request can be granted immediately.

Solution c.

Request from T2 is (0 1 1 0) and Available is (2 2 2 4)

As request(T2) < Available, so the request can be granted immediately.

Solution d.

Request from T3 is (2 2 1 2) and Available is (2 2 2 4)

As request(T3) < Available, so the request can be granted immediately.

5 0
3 years ago
What type of virus was the "lloveyou" virus?<br> 1.Trojan<br> 2.Worm
Paul [167]

Answer:

2. Worm

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • Remember that the function "main" takes optional parameters, these being common:
    10·1 answer
  • You would like to search for information about storms but not tornadoes. What type of search strategy may be useful?
    10·2 answers
  • Frank develops a questionnaire for his study on Internet dating. One of his questions asks, "How do you feel about Internet dati
    14·2 answers
  • A blue NFiPA label indicates: A) Health Hazard B) Special information C) Flammability D) Reactivity
    6·2 answers
  • You have just purchased a motherboard that has an LGA 1156 socket for an Intel Pentium processor. What type of memory modules wi
    14·1 answer
  • Which objects appear on the slide after she clicks OK? Check all that apply.
    13·1 answer
  • You should always be afraid to use the internet<br><br> True or false?
    11·1 answer
  • Write an application that determines whether the first two files are located in the same folder as the third one. The program sh
    6·1 answer
  • What is the base of a number system?
    8·1 answer
  • Which two extensions in scratch are correctly matched to their accessibility goals
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!