1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mars1129 [50]
3 years ago
14

Round-robin schedulers normally maintain a list of all runnable processes, with each process occurring exactly once in the list.

What would happen if a process occurred twice in the list? Can you think of any reason for allowing this?
Computers and Technology
1 answer:
Cloud [144]3 years ago
6 0

Answer:

A process will get more quanta per scheduling cycles. This is used to give more important process a larger share of the CPU.

Explanation:

You might be interested in
What is an example of new technology having a negative impact on sustainability?.
Sedbober [7]

An example of new technology that is having a negative impact on sustainability is using multiple servers to maintain a cryptocurrency operation.

<h3>How does technology influence sustainability?</h3>

The use of technology is one that have a lot of power to increase productivity, efficiency and cost savings, and others  but it is also known to have a negative effect on the environment.

Sustainability implies that one meets the needs of people without having to compromise the power of future posterity to meet their own needs.

Learn more about sustainability from

brainly.com/question/25350238

3 0
2 years ago
Generally considered to be the most important information security policies, what item below defines the actions a user may perf
tamaranim1 [39]

Answer:

A. Acceptable use policies

Explanation:

These specific actions that the user may perform are all described in the acceptable use policy. The company usually requires that the user read and sign this policy before being granted a network ID into the system itself. By signing this agreement the individual user agrees to perform ONLY the actions listed in the agreement and nothing else and are restricted from unauthorized areas.

3 0
3 years ago
PLEASE HELP!!!
tino4ka555 [31]

Answer:

C or D

Explanation:

If he has previous experience, C might be better answer, otherwise, D is right.

not sure with my answer either lol

6 0
2 years ago
Give two reasons why it is not advisable to open email from unknown sources​
sattari [20]

Answer:

1. It might give your device a malicious virus or can grab your ip, so it isn't a good idea to open unknown websites. Always go to safe webs!

2. It might be a scam, let's say it is for a free iphone and you put your info in. It's a win-lose thing.

Explanation:

6 0
3 years ago
Read 2 more answers
Briefly explain the importance of doing backup in systems administration and explain in detail any three methods for performing
Dmitry_Shevchenko [17]

Answer:

Importance of backup in system administration:

Backups are crucial in system administrations for preserving continuity and protecting against specific types of hardware failures, service interruptions, and human mistakes. To aid a company in recovering from an unexpected catastrophe, backup copies make it possible to restore data to a previous point in time. To safeguard against primary data loss or corruption, it is essential to save a copies of data on a different media. When a system administrator create a backup, he makes a copy of the data that you can restore if your main data is lost. These errors may be the consequence of faulty hardware or software, corrupted data, or a human error like a targeted attack or an unintentional deletion. System backup and recovery is therefore a crucial skill for system administrators as well as the companies they work for.

Three methods for performing backup:

  1. Disk image: A efficient method to back up not only the files and directories but also everything else on the system is by creating a disk image. If a user have a disk image, the user can restore everything, including the operating system, applications, data, and more, so the user won't have to worry about any difficulties. Placing the  disk image-containing DVD into the DVD-ROM to restore the backup. Additionally, just attach an external HDD to the computer if the user have a disk image that they made.
  2. External hard drive: The most common backup method is to use an external hard drive or even a USB flash drive. An HDD can be easily, quickly, and affordably backed up. It is effective since consumers may carry their portable backup with them wherever they go.
  3. Cloud backup: Cloud backup or Online backup has been around for a while, but not many people really utilize it. But the greatest backup technique by far is cloud backup. The user does not have to worry about hardware problems because their files are saved in the cloud and can be accessed from anywhere because the backups are automatically produced and everything is synchronized. It is one of the greatest methods to backup, especially when you consider that the contents are encrypted and stored securely.

6 0
2 years ago
Other questions:
  • When a crystal grows in unrestricted space, how does growth occur?
    14·2 answers
  • The button for adding a picture to a spreadsheet is found in the
    15·1 answer
  • 2. Imagine you play a game of fetch with the dog. It takes the dog 60 seconds to run a total of 180 meters. What was the dog's a
    6·1 answer
  • The set of communications rules for exchanging information electronically on the internet is called the ________.
    10·1 answer
  • The goal expressed in this definition states that data visualization is about ________________ .
    11·2 answers
  • (2) Design pseudocode for a program that accepts numbers from the user until the special number 555 is entered (you should use a
    12·1 answer
  • Which network component blocks status?
    9·1 answer
  • • R7.9 Write enhanced for loops for the following tasks.
    13·1 answer
  • What is a database and provide 2 examples of how you are using a database.
    5·1 answer
  • What is keyword density?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!