1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna [14]
3 years ago
6

Related to the State Process Model, what happens when an I/O event is triggered? a. The process moves from the state that is run

ning to the state where it waits b. The process moves from the state when is waiting to the state that is ready c. The process moves from the state that is running to the state that is ready d. The process moves from the ready to the state that is running e. A or B only f. All of the above
Computers and Technology
2 answers:
OLga [1]3 years ago
8 0

Answer:

when the I/O event is triggered the related model process in (f) all of the above. because

Explanation:

there are five state process model which include;

1.New

2. Ready

3.Running

4. Blocked

5.Exit.

sammy [17]3 years ago
6 0

Answer:

When the I/O event triggered, the process moves from the state that is in running, waiting, ready, and terminated. Option f is correct as the process model is based on these useful states for the understanding of the process.

Explanation:

In a computer system, the process contains a variety of states. These states are a useful abstraction for understanding processes.

There are five process

  • New
  • Ready
  • Run
  • Blocked Wait
  • Terminated

New _ In this process is created and programmed is present in secondary memory for the creation of the process.

Ready _ After the creation of process the process enters the ready state and loaded into main memory. The process is ready for execution by the CPU.

The CPU chooses run_ Process for execution.

Wait_When a process requests input from the user or needs access to the region, it enters into the wait state.

Terminated or complete_ process is terminated

All of these states are part of the State Process Model. All of the above are needed.

You might be interested in
What is phishing?
alexira [117]

Answer:

Phishing is the malicious act of keeping a false website or sending a false e-mail with the intent of masquerading as a trustworthy entity in order to acquire sensitive information such as usernames, passwords, and credit card details.

Therefore, the answer to the question is option C.

7 0
3 years ago
A device that towards data packets along networks
docker41 [41]

Answer:

  • Router

- Explanation

A router is a device that forwards data packets along network

  • <em>Hope</em><em> </em><em>it will help you</em><em>.</em><em>.</em><em>.</em><em>.</em>
6 0
3 years ago
What is the recommended size for bulleted text? 12–22 24–40 44–66 54–80
algol [13]
44–66

According to sources, the most probable answer to this query is 44–66 point size.
This is because the eyes and the illustration should match the proportion of distance and height factors.
Thank you for your question. Please don't hesitate to ask in Brainly your queries. 
5 0
4 years ago
Where is the third vanishing point in the three point perspective
Naya [18.7K]

Answer:

The third vanishing point is placed under or above the horizon line

Explanation:

The third vanishing point in three point perspective is not placed on the horizon line. Instead the third vanishing point is placed under or above the horizon line. Often the bottom vanishing point is placed off of the picture plane.

5 0
3 years ago
How to turn off location on iphone without person knowing
andrezito [222]

Answer:

airplane mode

Explanation:

5 0
3 years ago
Other questions:
  • Which sentences in the passage show the preventive measures to avoid data breach?
    9·1 answer
  • Who usually signs a collection letter?
    15·2 answers
  • The common field cricket chirps in direct proportion to the current tem­perature. Adding 40 to the number of times a cricket chi
    14·1 answer
  • 1. Implement a method factorial(int n), that takes a number (int) and returns its factorial. Factorial of an integer is the prod
    13·1 answer
  • You are attempting to run a Nmap portscan on a web server. Which of the following commands would result in a scan of common port
    12·1 answer
  • What are two reasons for converting a document or record into a digitized format?
    6·1 answer
  • ওয়ার্ড প্রসেসিং এ একটি সাধারন ডকুমেন্ট প্রিন্ট করার পদ্ধতি বর্ননা কর?answered
    8·1 answer
  • Electrical data suitable for transmission is called a(n)
    5·1 answer
  • 4. //Program prompts users for names and quantities for a $2.00 product and displays total for each user until “XXX” is entered
    15·1 answer
  • confidentiality ensures that only those with the rights and privileges to access information are able to do so.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!