1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sammy [17]
4 years ago
6

______ occurs when the system finds itself spending so much time swapping pages into and out from memory that little time is lef

t for useful work.
A. Spooling
B. Thrashing
C. An interrupt
D. A polling signal
Computers and Technology
1 answer:
satela [25.4K]4 years ago
5 0

Answer:

Option b is the correct answer for the above question.

Explanation:

Thrashing occurs when the virtual memory of the computer is more used. It is because the system does not have more memory. That's why the virtual memory is busy in the paging or other work of the operating system and there is no memory left for the other useful work of the system and then Thrashing occurs.

The question statement states the same which is described above and this is the cause when thrashing occurs. Hence the b option is correct. while other is not because--

  • Option "a" states about spooling but spooling is a concept of copy the data.
  • Option C states about an interrupt but it is a concept to stop the work of CPU when any input is coming from the outside.
  • Option D states about a pooling signal which is an operation of computers.

You might be interested in
You learn that in a previous security breach at GearUp, a disgruntled employee destroyed the encryption key that had been used t
lukranit [14]

Answer:

The data can be safeguarded using key escrow procedure.

Explanation:

Key escrow basically means to store the cryptographic key in an "escrow" by a reputable trusted third party. The copy of the encryption key is kept with the third party. In case the cryptographic key gets lost or destroyed, then the key escrow service helps to access the encrypted data. It also manages the access control to the key in case the key gets lost. So this way in case of security breach at GearOn the key escrow service can be used to re-implement or access the key easily.

6 0
3 years ago
A corporate user is attempting to connect to the company’s Windows domain server on the local network with her new laptop throug
andreev551 [17]

Answer:

B. Windows domain user name and password

Explanation:

Windows domain user name and password are login credentials required for the user to successfully sign in to the Windows domain.

The domain username and password are usually stored on a domain controller rather than on the host.

As a domain user, the computer seeks from the domain controller the privileges assigned to the user, if it gets a positive response from the domain controller, it authorizes the users login credentials without restrictions; else, it denies the user access.

8 0
4 years ago
In a "block" containment strategy, in which the attacker's path into the environment is disrupted, you should use the most preci
Slav-nsk [51]
The containment strategy prevents intruders from removing information assets from the network, and prevents attackers from using the organization's network as a launch point for subsequent attacks.
In a "block" containment strategy, in which the attacker's path into the environment is disrupted, you should use the most precise strategy possible, starting with <span>blocking a specific IP address. Correct answer: C

</span>

8 0
3 years ago
10
Dmitrij [34]

Answer:

i need more \\

Explanation:

Chemical cold packs should be used for bone and joint injuries because they are generally colder than ice and stay cold longer.

A.  

True

B.  

False

Reset

4 0
3 years ago
What are video games and what have they meant for society?
Paraphin [41]

video games are a source of entertainment for people especially children.

it helps relieve stress for adults or grown ups.

society sees video games as a negative impact on children and that it wastes their time.

8 0
3 years ago
Read 2 more answers
Other questions:
  • Select the tips you should follow when creating a newsletter.
    13·1 answer
  • A(n) ____ is a predefined procedure that you can call (or invoke) when needed.
    9·1 answer
  • Explain why a computer cannot solve a problem for which there is no solution outside the computer.
    14·1 answer
  • Since the 1970s, local tv newscasts have developed a similar look. that's because
    9·1 answer
  • A. What sectors are used with Foo?
    8·1 answer
  • Write a single if-test using Boolean operators and relaional operators to determine if a double variable x is between zero (excl
    11·1 answer
  • Which route of entry could chemicals use to enter through the body’s airways?
    8·1 answer
  • What is the point of brainy when other people have to answer your questions but not the cumputer
    9·1 answer
  • Information in _____ code can be transmitted without errors over the communication network.
    13·2 answers
  • What is a term commonly used to describe the Python dictionary feature in other programming languages
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!