1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
charle [14.2K]
3 years ago
15

A simple algorithm for handling requests works like this:________ a) all requests users make are stored. b) The elevator priorit

izes the requests that are on the way where it’s going, but also based on a first come first served principle. c) It is up to you how you design the algorithm.
Computers and Technology
2 answers:
bezimeni [28]3 years ago
8 0

Answer:

b) The elevator prioritizes the requests that are on the way where it’s going, but also based on a first come first served principle.

Explanation:

Elevator routing often looks complex, as the elevator has to decide whether to go to the person who has waited the longest or the one who is closest? There are also issues of how long should the rider spend.

A simple algorithm can be designed where the elevator prioritizes the requests that are on the way where it’s going, but also based on a first come first served principle. Once it exhausts the request in its current direction, it then switches directions if there are requests in that direction. This way the elevator is able to tackle the complex issue based on the simple algorithm.

stepan [7]3 years ago
4 0

Answer:

Answer is B. The elevator prioritizes the requests that are on the way where it’s going, but also based on a first come first served principle.

Refer below.

Explanation:

A simple algorithm for handling requests works like this:

The elevator prioritizes the requests that are on the way where it’s going, but also based on a first come first served principle.

You might be interested in
(50 points) {brainliest}
Elena-2011 [213]

C is the answer

bc i know it is

4 0
3 years ago
Read 2 more answers
What command is used to verify the condition of the switch interfaces, including the status of the interfaces and a configured I
vovangra [49]

Answer:

Show ip interface brief privileged mode command.

Explanation:

A switch is an intermediate network device for transmitting frames in a network. It operates at the Data-link layer of the OSI model. A Cisco switch uses the Cisco operating system for configuration.

There are three main mode in the switch operating system configuration interface, they are, user, privileged and global configuration mode.

The user mode has few commands vthat runs on it, but are not permanent configuration of the switch. The privileged mode is used mainly for verifying settings in the switch. To check for the IP addresses and status of switch ports, the "show ip interface brief" command is issued in the privileged mode.

All configuration in global mode that are saved in the startup configuration is permanent.

6 0
3 years ago
Phishing is a broad term that describes any program that is designed to cause harm or transmit information to others without the
katrin [286]
False phishing is the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
6 0
4 years ago
Consider a memory-management system based on paging. The total size of the physical memory is 2 GB, laid out over pages of size
Sliva [168]

Answer:

A. 31 bits

B. 13 bits, 18 bits

C. 256k

Explanation:

A.

We have total size of physical memory as 2gb

This means that 2¹ x 2³⁰

Using the law of indices,

= 2³¹

So physical address is equal to 31 bits

B.

We get page size = 8kb = 2³

1 kb = 2¹⁰

2³ * 2¹⁰ = 2¹³

So page replacement = 13 bits

Page frame number

= physical address - replacement bits

= 31 - 13

= 18 bits

C.

The number of frames is given as

2¹⁸ = 2⁸ x 2¹⁰ = 256K

So number of frames = 256K

D

Logical add space is 256K

Page size= physical pages = 8kb

Logical address layout= 28biys

Page number = 15 bits

Displacement = 12 bits

256k/8k = 32 pages in address space process

4 0
3 years ago
The random module is a group of functions that are used to deal with random numbers.
maksim [4K]
True because it is the
5 0
3 years ago
Read 2 more answers
Other questions:
  • QUESTION : John travels a lot and he needs to access his documents and services on the go. Which of these technologies allows hi
    15·1 answer
  • _______ computing refers to applications and services that run on a distributed network using virtualized resources.
    14·1 answer
  • The producer thread will alternate between sleeping for a random period of time and inserting a random integer into the buffer.
    7·1 answer
  • When will once upon a time season 6 air
    9·2 answers
  • Routing in Practice (30 points). For each of the statements below, decide which it is true or false, and briefly justify your an
    13·1 answer
  • Explain how you would insert graphics using your word-processing software.
    14·1 answer
  • E) Point out the errors( if any) and correct them:-
    14·1 answer
  • A constructor must have a return statement.<br><br> True<br><br> False
    14·2 answers
  • Guys, if I'm going back to 505 and it's a 7-hour flight or a 45-minute drive how do I get to 505?
    12·1 answer
  • Cryptography is the science of secret writing. Cryptography involves creating written or generated codes that allow information
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!