1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zolol [24]
4 years ago
15

Which type of page of replacement algorithm is Windows XP and Unix are using?

Computers and Technology
1 answer:
mel-nik [20]4 years ago
7 0

Answer:

Windows XP uses the Local Page Replacement algorithm. It is a type of FIFO. In this, Pages are taken from processes using more than their minimum working set and Processes initialize with a default of 50 pages. XP monitors page fault rate and adjusts working set size accordingly.

UNIX uses the Global replacement Algorithm through Modified second-chance clock algorithm.  Here Pages are aged with each second and Pages that are not used for a long time will eventually have a value of zero.

You might be interested in
When looking at security standard and compliance, which three (3) are characteristics of best practices, baselines and framework
Brilliant_brown [7]

Answer:

In order to observe best practices, and to meet with technical and other requirements, organizations often use frameworks for cybersecurity compliance and regulatory compliance. These frameworks provide best practices and guidelines to assist in improving security, optimizing business processes, meeting regulatory requirements, and performing other tasks necessary to achieve specific business objectives such as breaking into a particular market niche or selling to government agencies.

Many such frameworks exist, and the recommendations set out in them can impose difficult and often expensive demands on enterprise resources – especially in situations where an organization is subject to a number of regulatory compliance regimes, whose requirements it has to meet while maintaining its own strong cybersecurity status.

Explanation:

4 0
3 years ago
Your company is experiencing an increase in malware incidents. Your manager is asking for advice on how best to verify that comp
zepelin [54]

Answer:

Option C.

Explanation:

The company is witnessing a spike in incidents involving malware. The boss is looking for advice on the best way to check that corporate-owned desktops are up-to-date regarding security updates, anti-malware standards and software or application updates. The boss is also worried that somehow the staff-owned gadgets that link to the corporate Local area network use the same level of protection as the devices in the corporation.

So, the user implements security and resources from endpoint management system appliance.

7 0
3 years ago
A variable is assigned a value on line 328 of a program. Which of the following must be true in order for the variable to work?
Ivanshal [37]

Answer:

the answer is A

Explanation:

I just did this

3 0
3 years ago
Read 2 more answers
oftware that is free and whose code can be accessed and potentially modified by anyone is referred to as _____. shared source fi
ad-work [718]

Answer:

open source software

Explanation:

A software that is free and whose code can be accessed and potentially modified by anyone is referred to as an open source software. The license used by the developer of an open source software grants all users the permission to use, distribute and modify the software at any time.

Some examples of an open source software are Firefox, gimp, OpenOffice etc.

8 0
3 years ago
You have been asked to install a WLAN for a small business. You centrally locate the WAP in a large room that contains about 15
sveticcg [70]

Answer:

interference

Explanation:

The most likely reason for the connectivity problems is interference. This interference can be caused by many factors but in this scenario the most likely factor would be the metal studs and all the metal used to create the ceiling/floor. Metal is a huge interference when it comes to wifi signals. Depending on the type of metal and the amount it can greatly diminish the signal strength or even completely prevent the signal from passing to it's destination, regardless of how close the destination device is located.

4 0
3 years ago
Other questions:
  • What office application has animations on the home ribbon?
    7·2 answers
  • The it department is reporting that a company web server is receiving an abnormally high number of web page requests from differ
    13·1 answer
  • On what basis can you categorize the generations of computers?
    11·1 answer
  • An objective function in linearprogramming is a(n):
    11·1 answer
  • 2. Write a standalone function partyVolume() that takes accepts one argument, a string containing the name of a file. The object
    14·1 answer
  • Which careers have the highest minimum experience requirement?
    14·1 answer
  • What is the creative nature of a computer<br> Help
    15·2 answers
  • Write the corresponding Python assignment statements:
    13·1 answer
  • Sube
    10·2 answers
  • Which of the following is a part of a DML statement? a. CREATE b. ALTER c. DROP d. SELECT. SE_LECT
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!