1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna71 [15]
2 years ago
5

Discuss the concept of the “state of a process”. Give examples to illustrateyour answers?

Computers and Technology
1 answer:
Lady bird [3.3K]2 years ago
4 0

The Discussion on the concept of the “state of a process” is given below

<h3>What are the states of a process?</h3>

The state of a process is known to be a term that connote the current activity of any given process.

Note that it is said to be New  as the process is said to be in the process of being formed.

Note that it is one that is said to be Running as it is said to be in a state where the instructions are said to being executed.

Note that it is also known to be the process of  Waiting as the state of this process which is in waiting state is one which has to wait until an event has taken place.

The example is like I/O operation in the process of completion or receiving a given signal.

Learn more about process from

brainly.com/question/711394

#SPJ1

You might be interested in
You have $5 and earn $1.75 for each roll of wrapping paper you sell. Write an equation in two variables that represents the tota
qaws [65]

Answer:

A = 5 + 1.75r

Explanation:

Amount you have = $5

Earning per roll of wrapping paper = $1.75

Let

r = number of rolls of wrapping paper

A = Total amount earned

A = 5 + 1.75r

Equation that represents the total amount A (in dollars) you have after selling r rolls of wrapping paper is

A = 5 + 1.75r

3 0
3 years ago
External network security threats can include management failure to support organization-wide security awareness, inadequate sec
stiks02 [169]

Answer:

B. False

Explanation:

External security threat can be defined as any threats coming outside the company's computer network operation, usually carried out with negative or hostile intent for the purpose of stealing information or distracting the flow of operation. For example, Virus Attack

However, given that the question talked about the "management failure to support organization-wide security awareness, inadequate security policies, and unenforced security procedures."

Hence, this is not an External Security Threat, which means, the correct answer is FALSE.

5 0
3 years ago
A personal computer uses a number of chips mounted on a circuit board called
Vesnalui [34]
The answer is d.mother board 

7 0
3 years ago
Forwarded events can only be recorded when systems ADMINISTRATORS have de-established an event subscription. TRUE or FALSE
weeeeeb [17]

Answer:

True

Explanation:

Forwarded events can only be recorded when systems administrators have de-established an event subscription.

8 0
2 years ago
Please help me. It's due in 2 hours.
Neporo4naja [7]
1d 2b 3c 4a 5e 6f 7g
3 0
3 years ago
Other questions:
  • 2.Use loops to create a 4X6 matrix in which the value of each element is two times its row number minus three times its column n
    13·1 answer
  • • The length of time between water level measurements/ control adjustments is DT. • If the water level drops to the bottom of th
    13·1 answer
  • In a non-formatted/standard template, if the number 25 is converted to text format, the
    14·1 answer
  • Ano ang maikling kwento??
    9·1 answer
  • I NEED HELP ASAP!
    6·2 answers
  • A two-dimensional array of ints, has been created and assigned to a2d. Write an expression whose value is the number of rows in
    5·1 answer
  • Help!! Best answer will get Brainliest!!
    10·2 answers
  • Re:
    15·1 answer
  • Identify a statement that accurately differentiates between short-term memory and working memory.
    15·1 answer
  • ________ is a record in a relational database.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!