1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikitadnepr [17]
3 years ago
5

_______ software helps run the computer and coordinates instructions between other software and the hardware devices. select one

:
Computers and Technology
1 answer:
Mila [183]3 years ago
5 0
'SYSTEM' <span> software helps run the computer and coordinates instructions between other software and the hardware devices.</span>
You might be interested in
Is the ipv6 address 2001:1d5::30a::1 a valid address? why or why not?
defon
<span>Not a valid IPv6 address A valid IPv6 address consist of 8 groups of 4 hexadecimal numbers separated by colons ":". But that can make for a rather long address of 39 characters. So you're allowed to abbreviate an IPv6 address by getting rid of superfluous zeros. The superfluous zeros are leading zeros in each group of 4 digits, but you have to leave at least one digit in each group. The final elimination of 1 or more groups of all zeros is to use a double colon "::" to replace one or more groups of all zeros. But you can only do that once. Otherwise, it results in an ambiguous IP address. For the example of 2001:1d5::30a::1, there are two such omissions, meaning that the address can be any of 2001:1d5:0:30a:0:0:0:1 2001:1d5:0:0:30a:0:0:1 2001:1d5:0:0:0:30a:0:1 And since you can't determine which it is, it's not a valid IP address.</span>
6 0
3 years ago
Which of the following sets of values constitutes a valid RSA public key encryption system?
Gelneren [198K]

Answer:

oh I can't it looks so confusing

6 0
3 years ago
In your own words and in great detail explain the characteristics of the image types listed below. Give an example of when would
LenaWriter [7]

Answer:

  • JPG It's a standard image format for containing lossy and compressed image data.
  • PNG “Portable Graphics Format”. It is the most frequently used uncompressed raster image format on the internet .
  • GIF is a lossless format for image files that supports both animated and static images. It was the standard for 8-bit color images on the internet until PNG became a viable alternative
  • PDF Portable Document
  • SVG scalable vector graphics, and it is a file format that allows you to display vector images on your website.

Explanation:

  1. Despite the huge reduction in fil e size JPEG images maintain reasonable image quality.
  2. This lossless data compression format was created to replace the Graphics 2.Interchange Format (GIF) Like GIF images, PNG also have the ability to display transparent backgrounds.
  3. You may have seen them used often in email signatures. Animated GIFs are several images or frames combined in
  4. Used to display documents in an electronic form independent of the software, hardware or operating system
  5. This means that you can scale an SVG image up and down as needed without losing any quality, making it a great choice for responsive web design they are viewed onto a single file
7 0
3 years ago
Researchers today can use technology such as CAT scans and fMRI scans to measure brain activity. Some researchers ask their subj
Lerok [7]

Answer:

Introspection , Titchener

Explanation:

7 0
3 years ago
If a thread is not finished running, perhaps because it had to wait or it was preempted, it is typically restarted on the same p
Eva8 [605]

Answer:

c. processor affinity

Explanation:

Processor affinity is also called cache affinity and even sometimes regarded as processor pinning. It is a concept that allows a particular thread/process/program to run on and only on a specified core (processor) or set of cores. Even if the process is preempted, it will have to wait until it is restarted or continued by the core that started it in the first place. No other core(s) aside the specified one(s) will take on the process.

Processor/Cache affinity connects and disconnects a certain process from a CPU in such a way that only the specified CPU,  rather than another CPU, will always take on that process.

An advantage of this is that there is efficient optimization of cache. Also, if many processes are using or sharing the same data, it is just logical to attach all of those to the same processor.

<em>Hope this helps!</em>

7 0
3 years ago
Other questions:
  • The part of the computer that contains the brain, or the central processing unit, also knows as the
    5·1 answer
  • Joe, a user, has just installed his first home wireless router. Which of the following tasks should be considered to help secure
    8·1 answer
  • What do economists call a decline in the real GDP combined with a temporary rise in price level?
    8·2 answers
  • Write a method so that the main() code below can be replaced by simpler code that calls method calcMilesTraveled(). Original mai
    11·1 answer
  • TOT al<br>Name TWO examples of these settings and utilities. (2)​
    12·1 answer
  • When looking at security standard and compliance, which three (3) are characteristics of best practices, baselines and framework
    8·1 answer
  • What validation type would you use to check that numbers fell within a certain range? a) range check b)presence check c)check di
    9·1 answer
  • High-level languages must be translated into machine language before they can be executed. _________________________
    10·1 answer
  • A large retail company hires several new joiners and would like to incorporate Virtual Reality (VR) into their onboarding proces
    9·1 answer
  • CODEHS: WHY is it important to know the difference between div and span?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!