1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tamiku [17]
3 years ago
14

Computers heat resistant materials breathing systems for fire fighters food-growing technologies improvements in all of the item

s in this list were first made possible by
a.space exploration.
b.internet providers.
c.religious institutions.
d.automobile manufacturers.
Computers and Technology
1 answer:
Scorpion4ik [409]3 years ago
4 0
<span>Computers heat resistant materials breathing systems for fire fighters food-growing technologies improvements in all of the items in this list were first made possible by :  a.space exploration.</span>
You might be interested in
The user can set their own computer hostname and username. Which stage of the hardware lifecycle does this scenario belong to?
11111nata11111 [884]

Answer:

Deployment

Explanation:

Hardware lifecycle management is geared at making optimum use of the computer hardware so as to maximize all the possible benefits. During the deployment stage of the hardware lifecycle, the user is prompted by the computer to input their own computer hostname and username. In doing this, it is important that the user takes note of possible flaws in security. Passwords are set at this stage too. The four stages in the hardware lifecycle are procurement, deployment, maintenance, and retirement. At the deployment stage, the hardware is set up and allocated to employees so that they can discharge their duties effectively.

So, for organizations, it is important that strong passwords are used to prevent security breaches in the event that an employee leaves the organization.

8 0
3 years ago
Why will the standard replacement algorithms (LRU, FIFO, clock) not be effective in handling this workload for a page allocation
dusya [7]

Answer:

These algorithm keeps an eye on which page was used when. LRU assumes that the page that was recently used has more probability  

of being used or requested by the user. Thus, it keeps the pages that were recently used, when a new page is requested. If page  

fault occurs, the requested page is fetched and it replaces the page in cache which was last referenced earlier than any other page  

in the cache (or frame).The LRU associates a time with each page in the memory and the ones with the greatest value are replaced.  

It does not suffer from Belady’s anomaly. The page fault will be referred when 512 page frame are reached. This is the total length of the complete sequence.

FIFO replaces pages that come in cache firstly. FIFO stands for First in first out.  

(b) The FIFO replacement algorithm replaces the page which was first brought into the memory followed by the next and soon.  

This algorithm suffers from Belady’s anomaly. In First In First out (FIFO) page replacement scheme of page replacement, the requests  

are executed as they are received. When a new request is made of a page which is not available in the existing frames, then the requested  

page is acquired from the memory. The page in the first frame is replaced by the requested page. If again a request is made of a page not  

yet available in the frames, it is fetched from the memory and it replaces the second frame's page, and so on.  

There are total 500 frames given. The alternative approach which is better than clock algorithm, FIFO, and LRU is that the pages  

from 0 to 498 are set to the fixed frames. Thus, 499 frames are fixed and only one frame can vary.

Explanation:

6 0
3 years ago
Which of the following does NOT describe word processing?
GarryVolchara [31]

Answer:

Editing graphics

Explanation:

I looked it up (at least I was honest)

3 0
3 years ago
Read 2 more answers
Name the written test a potential driver must pass and list the minimum required score to earn a learner’s license.
ryzh [129]

Answer:

So as to get a learner’s license, teen drivers are required to finish a composed assessment. Ordinarily they will get ready for this test by finishing a driver’s training course. In spite of the fact that not a necessity in all states, drivers ed is the least demanding approach to be altogether arranged for the confused driving laws and situations you'll look on the license test. When you finish your grant assessment and procure a grant, there may at present be sure confinements joined to this temporary permit, for example, requiring an authorized driver over a specific age to be situated in the traveler situate, constraining your heading to light hours, and other state-commanded rules.  

General United States Permit Requirements  

While each state has its own arrangement of rules, when all is said in done, teenagers between 14 and 18 years of age can begin the drivers training and students license process. When a youngster driver has gotten a learner grant, there are extra state-explicit prerequisites they should meet before they can apply for their drivers permit.  

Before acquiring a learner grant in any express, a young person is required to finish a driving learning assessment. Driver’s instruction is the most ideal route for a youngster to plan for this test, regardless of whether the state requires it or not. At times, passing a driver’s last test of the year can substitute for the composed test. Regardless of how the test is taken, understudies must go with at any rate a 70% or higher, contingent upon that state's base. When the individual passes, a youngster driver will be issued a learner license. A few states require teen drivers to have a grant for at least a half year before they can take their drivers permit test.

Answer details:

Subject: Computer and technology

Level: High school

Keywords:

• Learner’s licence

• Potential drivers

• Written test

• Requirements for written test

Learn more to evaluate:

brainly.com/question/4997492

brainly.com/question/4010464

brainly.com/question/1754173

7 0
4 years ago
Read 2 more answers
When you are using remote control services and need to enter the ip address of the system you want to control, you should use th
il63 [147K]
<span>When you are using remote control services and need to enter the IP address of the system you want to control, you should use the ipconfig command.
</span>The name of the command ipconfig comes from internet protocol configuration. the command ipconfig displays the IP address, subnet mask, and default gateway for all interfaces. Besides that it d<span>isplays the network configuration, it can be used with parameters and can refresh DHCP and DNS settings.</span>
8 0
3 years ago
Other questions:
  • Why do bullies and criminals often say things online they otherwise wouldn’t say
    9·2 answers
  • When using a graphics editing program, which option allows you to adjust the space around an image?
    15·1 answer
  • Two powerboats are about to cross paths. what should the boat on the starboard (right) do?
    11·1 answer
  • Which of the following is the most effective password?
    15·2 answers
  • Why is proper planning important?
    10·1 answer
  • Why are renewable natural resources important? A.fossil fuels can be replaced quickly.
    10·1 answer
  • Which examples demonstrate common qualifications for Marketing Information Management and Research careers? Check all that apply
    9·2 answers
  • It is for employees to make mistakes that compromise the security of an organization’s computer devices and sensitive informatio
    10·2 answers
  • A diminished triad can be indicated by
    5·1 answer
  • When users connect to the network, they use a basic hardware terminal to access a desktop hosted on a virtualization server. wha
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!