1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gekata [30.6K]
2 years ago
15

What is a thread? what resources does it share with other threads in the same process?

Computers and Technology
1 answer:
mixer [17]2 years ago
5 0

A thread is a basic unit of CPU utilization; it contains a thread ID, a program counter, a register set, and a stack.

It shares with other threads belonging to the same function its code section, data section, and other operating-system resources, such as open files and signals.

<h3>What resources does it share with other threads in the same process?</h3>

Thread. When a process starts, it is allocated memory and resources. Each thread in the process shares that memory and resources. In single-threaded processes, the process contains one thread

<h3>What is a thread in a process?</h3>

A thread is a basic unit to which the operating system allocates processor time. A thread can perform any part of the process code, including parts currently being executed by another thread. A job object permits groups of processes to be managed as a unit.

To learn more about Thread, refer

brainly.com/question/10377150

#SPJ4

You might be interested in
Ebba has received a new initiative for her security team to perform an in-house penetration test. What is the first step that eb
myrzilka [38]

The first step that Ebba should take is: Information gathering and Reconnaissance.

<h3>What is an In-house Penetration Test?</h3>

An in-house Penetration test is a form of offensive test that is aimed at finding the lapses that a system has and initiating attacks to know the best way to prevent them.

Before launching such a test it is advised to plan and gather information about the possible lapses.

This will help the pen tester to know what attacks to launch and the right measures to resolve them. So, the first step that Ebba should take is Information gathering and Reconnaissance.

Learn more about In-house Penetration test here:

brainly.com/question/19085749

3 0
2 years ago
What type of error results from an error in the formatting of the program code?
NNADVOKAT [17]
I believe the answer is a syntax error. For example, in java if a semicolon is missed, a syntax error will be produced because the code cannot compile.
5 0
3 years ago
Which option correctly completes this statement? Programs can repeat simple instructions very quickly to I. help human users to
inna [77]

Answer:

I, II only

Explanation:

A computer program is a compilation of instructions and commands that can be executed by a computer to carry out a specific task. Most computer devices can only function optimally with the help of a program.

Programs can repeat simple instructions very quickly in order to assist individual users to recognize images and sound effortlessly and to get rid of the drudgery of repeating instructions and commands by hand

5 0
3 years ago
What is a message called that is delivered by TCP? What is a message called that is delivered by UDP? At which layer do the two
Mrrafil [7]

Answer:

  • Transmission Control Protocol is a Transport Layer protocol.  
  • This protocol is connection oriented which means that a connection is set up before the data packets are transmitted between the source and destination host which is a very reliable way of data transmission.
  • The connection is established between the source and the destination, after this the data is transmitted between them and lastly the connection is ended or terminated after the data transmission.
  • The packet or a messages that is delivered by TCP is called segment.
  • Basically TCP divides the data into small parts or chunks which are called segments.
  • The segment has a header and data section.
  • The segment header is further divided into the following parts.
  • Source port (sending port), destination port (receiving port), sequence number which is allocated to the first byte in the segment so that if the segments at the destination are sent out of order then it will help to rearrange these segments, Acknowledgement Number is number that the acknowledgement number sender expects to receive, header length, control flags which are used to control connection set up, connection termination and flow control, window size that a sender is ready to receive, Checksum field enables error control, Urgent pointer which is used to refer to data that is urgently needed to reach the receiving phase as soon as possible.  
  • User Datagram Protocol (UDP) is a Transport Layer protocol and a part of Internet Protocol suite.
  • This protocol is connection-less which means there  is no need to establish a connection between source host and destination host prior to the transmission of data which is an unreliable data transmission way.
  • The message in UDP is called datagram .
  • Unlike TCP segments there is no need to consider the order in which datagrams are sent or received.
  • Datagram has a header part which contains routing information a data section which shows the data to be transmitted.
  • Header has source port, destination port, checksum and length fields.
  • TCP and UDP protocols work in Transport Layer.
  • This layer is responsible for end to end delivery of data between source and destination hosts.
  • It ensures reliable data transmission and manages flow control and also ensures that packets reach in the right order in which they were sent.
5 0
3 years ago
Which of these files is most likely to be a helper file for an application?
Ludmilka [50]

Answer:

library.mov

Explanation:

hardware management

3 0
4 years ago
Read 2 more answers
Other questions:
  • Which of the following may present a problem for Linux users?
    13·2 answers
  • The elements of an integer-valued array can be set to 0 (i.e., the array can be cleared) recursively as follows: An array of siz
    8·1 answer
  • Write a complete function called lowestPosition() which takes as array (of double) and the number of elements used in the array
    9·1 answer
  • Match the tool to the task it helps to accomplish. Thesaurus allows the user to find the synonyms and antonyms of a word Smart L
    8·1 answer
  • Select the correct statement(s) regarding CENTREX. a. CENTREX systems reside at the service providers central office, however, t
    11·1 answer
  • Considering current online newspaper editions and the characteristics of digital age media, how do you think newspaper design mi
    7·1 answer
  • Gear systems with __________ can have both drive and driven gears on the same shaft. a. an odd number of gears b. an even number
    6·1 answer
  • Discuss the advantages of Database approach to systemdevelopment
    12·1 answer
  • A(n) ____________________ is a named collection of stored data, instructions, or information and can contain text, images, video
    5·2 answers
  • Write a program with the total change amount as an integer input, and output the change using the fewest coins, one coin type pe
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!