1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna [14]
3 years ago
6

Related to the State Process Model, what happens when an I/O event is triggered? a. The process moves from the state that is run

ning to the state where it waits b. The process moves from the state when is waiting to the state that is ready c. The process moves from the state that is running to the state that is ready d. The process moves from the ready to the state that is running e. A or B only f. All of the above
Computers and Technology
2 answers:
OLga [1]3 years ago
8 0

Answer:

when the I/O event is triggered the related model process in (f) all of the above. because

Explanation:

there are five state process model which include;

1.New

2. Ready

3.Running

4. Blocked

5.Exit.

sammy [17]3 years ago
6 0

Answer:

When the I/O event triggered, the process moves from the state that is in running, waiting, ready, and terminated. Option f is correct as the process model is based on these useful states for the understanding of the process.

Explanation:

In a computer system, the process contains a variety of states. These states are a useful abstraction for understanding processes.

There are five process

  • New
  • Ready
  • Run
  • Blocked Wait
  • Terminated

New _ In this process is created and programmed is present in secondary memory for the creation of the process.

Ready _ After the creation of process the process enters the ready state and loaded into main memory. The process is ready for execution by the CPU.

The CPU chooses run_ Process for execution.

Wait_When a process requests input from the user or needs access to the region, it enters into the wait state.

Terminated or complete_ process is terminated

All of these states are part of the State Process Model. All of the above are needed.

You might be interested in
"how do we store information in long term memory?"
Andru [333]

Answer:

By saving it in the hard drive.

Hope I helped!

8 0
3 years ago
A. Modify the FitnessTracker class that includes data fields for a fitness activity, the number of minutes spent participating,
Elenna [48]

Answer:

It keeps saying servers fully loaded

Explanation:

5 0
3 years ago
Part of implementing Ken 7 Windows Limited new enterprise resource planning (ERP) software is ensuring all workstations and serv
spayn [35]

Answer:

Explanation:

1) The Functions a software application provide to keep a web browser secured includes:

a) The web browser should always be updated, you can keep it on "automatic update" option enable on your browser settings so that it will be automatically updated whenever the browser gets an update.

b) Always keep the third party cookies disabled because of the many unauthorized and phishing sites over the internet. This leaves the browser unsafe and cause higher security risk so block all the third party sites and cookies from the browser.

2) The Functions a software application prohibit to keep a web browser secured includes:

a) Do not store passwords on your web browser, deny the "store password" option on your browser settings. This is very important Even if you store passwords on your web browser do set a very strong master password to access all the stored passwords.

b) Don't ever click on unwanted and unknown hyperlinks. There will be many unsolicited attachments, files, etc over the internet please do not open or download it unnecessarily.

3) The functions a software application should provide to keep a web server secured includes:

a) Always using an application scanner. Whenever you install or download any new applications, scan the application before accessing it or opening it.

b) Install all the security patches to keep off hackers as they are many on the internet.

4) The Functions a software application should prohibit to keep a web server secured includes:

1) Uninstall an application that has not been used for long time, because they are actually of no use.

b) There may be scripts, files, setups, codes stored on the web server unknowingly so do check it and delete all the sample scripts, files and codes from the web server.

3 0
3 years ago
In your Ice Breakers game, when does the player lose a life?
Ivanshal [37]

Answer:

D. When the snowball leaves the play area on the bottom

5 0
3 years ago
Read 2 more answers
Which of the following statements is correct?
quester [9]

Answer:

hmm... sorry I don't know

4 0
3 years ago
Read 2 more answers
Other questions:
  • 1. Consider a direct-mapped cache that can accommodate 8Mbytes from a main memory, that uses a 32-bit address and 32-byte blocks
    5·1 answer
  • Identify at least five different Information Technology careers that you could pursue in your home state, and choose the three t
    10·2 answers
  • Fair Use means a teacher can take the contents of a web activity page and repost it in your school's web site because it is for
    7·1 answer
  • Most hand sewing begins and ends with
    5·1 answer
  • The smallest unit of storage is​
    15·1 answer
  • You are comparing cryptographic solutions to implement at your organization. Which two items should you focus on when you are ev
    12·1 answer
  • Write a program that first reads in the name of an input file and then reads the input file using the file.readlines() method. T
    7·1 answer
  • What can be done to solve unemployment problem?​
    11·1 answer
  • Write a for loop that uses the loop control variable to take on the values 0 through 10.
    10·1 answer
  • * what is an electronic mail ?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!