1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
charle [14.2K]
3 years ago
15

A simple algorithm for handling requests works like this:________ a) all requests users make are stored. b) The elevator priorit

izes the requests that are on the way where it’s going, but also based on a first come first served principle. c) It is up to you how you design the algorithm.
Computers and Technology
2 answers:
bezimeni [28]3 years ago
8 0

Answer:

b) The elevator prioritizes the requests that are on the way where it’s going, but also based on a first come first served principle.

Explanation:

Elevator routing often looks complex, as the elevator has to decide whether to go to the person who has waited the longest or the one who is closest? There are also issues of how long should the rider spend.

A simple algorithm can be designed where the elevator prioritizes the requests that are on the way where it’s going, but also based on a first come first served principle. Once it exhausts the request in its current direction, it then switches directions if there are requests in that direction. This way the elevator is able to tackle the complex issue based on the simple algorithm.

stepan [7]3 years ago
4 0

Answer:

Answer is B. The elevator prioritizes the requests that are on the way where it’s going, but also based on a first come first served principle.

Refer below.

Explanation:

A simple algorithm for handling requests works like this:

The elevator prioritizes the requests that are on the way where it’s going, but also based on a first come first served principle.

You might be interested in
Which of the following can computer maintenance software determine?
Softa [21]

Answer:

A

Explanation:

Becuase i picked that and i git it right

7 0
3 years ago
If you are trying move a hard drive from a non-working computer to a working computer for the purposes of accessing the data on
Llana [10]
You must have an administrator password before you can access the drive <span />
5 0
3 years ago
What are the main advantages of the d-step tuning of 2023 murano’s xtronic cvt®?.
DedPeter [7]

The main advantages of the d-step tuning of 2023 Murano's xtronic cvt is that:

  • It gives room for the transmission to quickly change ratios in regards to quick acceleration.
  • When at higher rpm, it help one to stepped acceleration via the use of linear acceleration feel.

<h3>What kind of transmission does a Nissan Murano have?</h3>

It is known to have a continuously variable automatic transmission (CVT) and it is one whose only engine is said to give about a 3.5-liter V-6 that helps to bring about a lot of power.

Note that the main advantages of the d-step tuning of 2023 Murano's xtronic cvt is that:

  • It gives room for the transmission to quickly change ratios in regards to quick acceleration.
  • When at higher rpm, it help one to stepped acceleration via the use of linear acceleration feel.

Learn more about cars from

brainly.com/question/25749514

#SPJ1

6 0
2 years ago
__ are designed to be used with everyday objects, such as home appliances, gaming consoles, digital cameras, e-readers, digital
LenaWriter [7]

Answer:

Embedded Operating System

Explanation:

An embedded operating system is a specialized operating system dedicated to perform a unique task for a digital device other than your desktop or laptop. For example, we can find this operating system appears in a washing machine to enable user to control the operation of the washing machine. This type of operating system is designed to be more resource efficient. An embedded operating system can also found in cars, digital television, ATM machine, digital camera etc.

3 0
3 years ago
You want to create a hyperlink within your document to the sec web site. which type of link do you create?
snow_lady [41]
An Existing file or web page. 
4 0
3 years ago
Other questions:
  • The _____ establishes that the destination device is present on the network, verifies active service, and informs the destinatio
    13·1 answer
  • Which describes which CTSO each student should join?]
    7·1 answer
  • This problem has been solved!
    8·1 answer
  • Charles Mott works for a company called VeriSign that acts a trusted third party to verify information. One of Charles' largest
    15·1 answer
  • Explain the difference between social engineering and reverse social engineering.
    6·1 answer
  • While the Internet is used to share many useful services and information, there are growing concerns about the way that the Inte
    8·1 answer
  • How is an interpreter different from a compiler?
    9·2 answers
  • How to disable Fortinet?
    12·1 answer
  • It's generally best to use what types of sites for factual internet research? Select all that apply from the choices below.
    5·2 answers
  • LAB: Phone number breakdown Given a long long integer representing a 10-digit phone number, output the area code, prefix, and li
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!