1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yanalaym [24]
3 years ago
9

Which algorithm makes the most efficient use ofmemory?

Computers and Technology
1 answer:
SashulF [63]3 years ago
5 0

Answer:

Best-fit Algorithm

Explanation:

Best-fit: Allocating the smallest memory location that is greater than or equal to the size of process.

<u>Example</u>

Let these are the memory locations-210kb,310kb,260kb,610kb

                    and size of processes-160kb,450kb,250kb,300kb

For the first-fit,

We allocate 160 kb to the 210kb memory location

Then, we allocate 450 kb to the 610kb because others don't have the size.

Then,we allocate 250kb to the 310 kb.

300 kb will stop,as no memory locations can execute.

For the Best-fit,

We allocate 160 kb to the 210kb memory location

Then,we allocate 450kb to the 610kb.

Then,we allocate 250kb to the  260kb not 310kb according to best-fit.

Then we allocate 300kb to the 310kb.

For the worst fit,

We allocate 160 kb to the 610kb memory location according to the worst-fit algorithm.

Then,we can't allocate 450kb to any memory location.

Then,we allocate 250kb to the 310kb .

We can' allocate 300kb in 260kb memory location.

As we can see from this example that in First-fit algorithm 300kb process will stop as no memory location is there.

In worst-fit algorithm ,We can't allocate 450kb,300kb to any memory locations.

In Best-fit algorithm,we can allocate the process to each location,so this algorithm is using memory in a efficient way.    

You might be interested in
Your company has decided to implement a wireless network. The wireless network users must be able to connect to resources on you
Brums [2.3K]

Options:

A Infrastructure mode

B Ad hoc mode

C a wireless access point

D static IP addresses

E APIPA

Answer:

A. Infrastructure mode

C. a wireless access point

Explanation: A DHCP is a server that makes use of s standard protocol called dynamic host configuration protocol to automatically assign internet protocol (IP) addresses and other computer parameters to clients. It gives them the opportunity to effectively make use of other network services such as DNS( domain name system) and NTP(network time protocol).

8 0
3 years ago
Which program will have the output shown below?
MariettaO [177]

Answer:

for count in range(12,15)

Explanation:

This is a 'For' loop in python programming language and it take two or three arguments, the include: start, stop, step)

from the options given we only have two arguments (start, stop)

from my answer, the loop will begin from 12 and ends at (n-1) that's why it prints out 12, 13, and 14 only.

7 0
3 years ago
You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffing software on a d
Alecsey [184]

Answer:

Promiscuous mode

Explanation:

6 0
3 years ago
Is it always best for a company to make decisions based on data, or are there some situations where they should not focus on dat
Serhud [2]

Answer:

data-driven decision

Explanation:

While 91% of companies say that data-driven decision-making is important to the growth of their business, only 57% of companies said that they base their business decisions on their data. Data-driven decision-making is a great way to gain a competitive advantage, increase profits and reduce costs!

6 0
3 years ago
How many of yall are willing to subscribe to my channel called "Space Juice" with around 248 subs?!​
Alborosie

Answer:me 148

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • Which tag pair contains the items in an ordered or unordered list?
    12·1 answer
  • The ____ category of apps makes the computer easier for blind people to use.
    9·1 answer
  • To use the program service routines, the user's program makes requests to the operating system through the
    10·1 answer
  • OSHA standards appear in the ___________ and are then broken down into ____________.
    9·1 answer
  • You are in charge of an event at work. You want to plan and schedule events and resourse. What type of software should you use?
    14·2 answers
  • A digital designer might do computer animations for video games,<br> OA<br> True<br> OB<br> False
    12·2 answers
  • The network team has well established procedures to follow for creating new rules on the firewall. This includes having approval
    15·1 answer
  • I need help ASAP please and thank you!
    14·1 answer
  • Horizontal and vertical flips are often used to create ___.
    12·1 answer
  • a cloud access security broker (casb) provides protection across 4 areas/pillars: visibility to detect all cloud services, data
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!