1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ale4655 [162]
2 years ago
13

In the event that a thread loses access to the cpu, such as via a time-out, sleep, block, or wait state, what happens when the t

hread is ready to resume execution?
Computers and Technology
1 answer:
Varvara68 [4.7K]2 years ago
7 0

Answer:

The thread is moved to the back of the Ready Queue

You might be interested in
Suppose two computers (A & B) are directly connected through Ethernet cable. A is sending data to B, Sketch the waveform pro
ICE Princess25 [194]

Answer:

Physical / Data link layer

Explanation:

If two computers (A & B) are directly connected through Ethernet cable. A is sending data to B, the data would be transmitted if the network is clear but if the network is not clear, the transmission would wait until the network is clear.

The Open Systems Interconnection model (OSI model) has seven layers each with its own function.

The physical layer is the first layer responsible for data transmission over a physical link. The data packets are converted to signals over a transmission media like ethernet cable.

The data link layer is the second layer in the OSI layer responsible for transmission of data packets between nodes in a network. It also provides a way of detecting errors and correcting this errors produced as a result of data transmission.

4 0
4 years ago
during zach's second visit of the year, he incurred a $450 bill. Describe how much is paid by Zach and the insurance carrier
icang [17]
Idk just need points
6 0
3 years ago
When an object reference is passed as a parameter to a method, modifying the members of that object from inside the method will
bogdanovich [222]

Answer:

A) True

Explanation:

Objects are known as reference types, meaning that they are always accessed by references, not copied. When a method is called, passing an object to it, Java passes a reference of that object to the method and when that reference is modified, the changes can be seen in the object itself. Therefore a mutable object can be mutated anywhere- either from where it is created or by a method it is passed to. Hence the need to always use privacy modifier keywords such as public, private or protected, to determine the exposure of class properties and methods.

7 0
3 years ago
)What is proceduralabstraction, and why is it important inComputer Science
STatiana [176]

Answer:

Procedural abstraction is a method in which all sub tasks of a whole functionality must be created separately as method and each method/ procedure must be performing a distinct functionality. For example if we want to write a program to calculate and display result of students in class and create separate methods to get students record, to calculate grades to display results is a procedural abstraction approach. Here not only the methods created have distinctive function the administrative can vary the level of abstraction as well.

It is important in computer science for the following ways:

1) Increase the level of code readiness as all separate functionality tasks will have a separate methods.

2) Prevents unauthorized of data.

6 0
3 years ago
What are the positive things the internet does for society
Norma-Jean [14]

Answer:

1speed, 2security,3easy online collaboration

Explanation:

1you can share and transfer files very first

2-different users access levels and password can be created to restrict an outhorised person

6 0
3 years ago
Other questions:
  • Angelina, the outgoing student body president, has finished a report about the upcoming school election. She wants to add a bord
    7·2 answers
  • What function does a mobile device’s accelerometer serve?
    8·2 answers
  • Evaluate the following expressions.
    10·1 answer
  • What is an (CR) Optical character recognition?
    13·2 answers
  • Computers are used to store, retrieve, and _____ data. manipulate mechanize memorize operate
    12·1 answer
  • Write any four difference between email and effects​
    14·1 answer
  • Write an algorithm to check whether the given number is divisible by 2,3 and 6 or not​​
    9·1 answer
  • The science of how an object reacts to its motion through air is called _______________. (12 letters)
    13·2 answers
  • __________ may be defined as the application of methods and means to ensure that test results are reliable and valid, and errors
    11·1 answer
  • For a list of numbers entered by the user and terminated by 0, find the sum of the positive number and the sum of the negative n
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!