1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leokris [45]
2 years ago
6

iv. Assuming the above operating system that cannot perform memory deallocation. Name at least three effects on the overall syst

em performance that might result and explain your answer
Computers and Technology
1 answer:
GuDViN [60]2 years ago
6 0

The  three effects on the overall system performance that might result are:

  • No Space - this is when the Ram memory can be full due to different reasons.
  • The speed of the hard disk.
  • Hard disk space.

<h3>What is Memory Deallocation?</h3>

Operating system is known to be one that tends to share or allocates memory for the jobs that need to be processed.

Once the processing is said to be completed and no other jobs is known to be waiting for the memory space, this is the time that one can be able to use to release the said memory.

Note that the Releasing the allocated memory space is said to be deallocation.

Hence, The  three effects on the overall system performance that might result are:

  • No Space - this is when the Ram memory can be full due to different reasons.
  • The speed of the hard disk.
  • Hard disk space.

Learn more about operating system  from

brainly.com/question/22811693

#SPJ1

You might be interested in
Which term best describes the operating system of a computer
ololo11 [35]

Answer: System Software

Explanation:

7 0
3 years ago
Which orientation style has more height than width?
gayaneshka [121]

Answer:

"Portrait orientation" would be the correct answer.

Explanation:

  • The vertical picture, communication as well as gadget architecture would be considered as Portrait orientation. A webpage featuring portrait orientation seems to be usually larger than large containing lettering, memo abases as well as numerous types of content publications.
  • One such volume fraction also becomes perfect for impressionism depicting an individual from either the top.

Thus the above is the correct answer.

3 0
3 years ago
What two statements about IPv6 addresses are true? This task contains the radio buttons and checkboxes for options. The shortcut
Oliga [24]

Answer:

A and C

Explanation:

Option A:

In IPv6 there is a rule to reduce an IPv6 address when there are two or more consecutive segments of zeros just one time. This rule says that you can change the consecutive zeros for “::”  

Here is an example

How to reduce the following IPv6 address?

ff02:0000:0000:0000:0000:0000:0000:d500

Ans: ff02::d500

Example 2:

2001:ed02:0000:0000:cf14:0000:0000:de95

Incorrect Answer -> 2001:ed02::cf14::de95  

Since the rule says that you can apply “::” just one time, you need to do it for a per of zero segments, so the correct answer is:

Correct Answer -> 2001:ed02::cf14:0:0:de95

Or

2001:ed02:0:0:cf14::de95

Option C:

Since in IPv6 there are 2^{128} available addresses which means 340.282.366.920.938.463.463.374.607.431.768.211.456 (too many addresses), there is no need of NAT solution, so each device can have its own IP address by the same interface to have access through the internet if needed. If not, you can block the access through internet by the firewall.

4 0
4 years ago
How do transformers work?
Umnica [9.8K]
A transformer will either step up or down to the necassary voltage using a core wrapped in a coil of wires.
8 0
3 years ago
Read 2 more answers
Why is it difficult to enforce laws against intellectual theft?
Mnenie [13.5K]

Answer:

The best answer is: all intellectual theft occurs online and through digital networks.

Explanation:

<em>Because the implementation is online and through the network, it is difficult to monitor and justify the safety of the victim and the theft. Internet is widely available to all individuals who has access to it. No matter what is the age, gender and nationality of the victim. It is difficult to maintain a law with its very wide scope and the audiences involved. </em>

3 0
3 years ago
Other questions:
  • 1. Mobile devices have a _________ viewport that displays a web page content that fits within a mobile screen.
    11·1 answer
  • What two windows tools can you use to know how much ram is installed on your system?
    10·1 answer
  • What do you do to add a line or circle to your presentation?
    7·2 answers
  • supppose we already have a list called words, containing all the words(i.e., string).Write code that produce a sorted list with
    14·1 answer
  • In your opinion, why did Proponents<br>of IPs used IPV6 instead of IPv5​
    7·1 answer
  • Professor Gig A. Byte needs to store text made up of the characters A with frequency 6, B with frequency 2, C with frequency 3,
    10·1 answer
  • The following are part of characteristics of a software requirement specification.
    6·1 answer
  • What is a variable in programming?
    10·1 answer
  • Data is communicated through various input devices true or false​
    8·1 answer
  • You are working on a ticket for a user who cannot access the Internet from their PC. After troubleshooting, how do you confirm t
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!