Answer: d. the time quantum should be as small as possible.
Explanation: Round robin is a CPU scheduling algorithm. If the time quantum is extremely small, number of context switches is very high, round robin scheduling will be same as processor sharing algorithm. Then the algorithm is good. Very large time quantum will make response time of processes too much which may not be tolerated in interactive environment.
A spreadsheet is a software application which is used to display numerical data in a tabular form. It has <em>further functions</em> which includes organizing, displaying, calculating data, etc where the data can be viewed at a glance and retrieved from memory.
There are <em>different types</em> of spreadsheet which includes:
- <u>G00gle Sheet</u>
- <u>Microsoft Excel</u>
- <u>LibreOffice</u>
- <u>Smartsheet,</u> etc.
Data can be arranged in rows and columns.
Please note that your question is incomplete so I gave you a general overview to help you get a better understanding of the concept.
Read more here:
brainly.com/question/22101774
Opening unfamiler emails and visiting unknown websites
Answer:
ansList =input().split() #get input and split it by space
ansList = [int(i) for i in ansList if int(i)>0] #turn string to integer,and get all positive integers
print(ansList)
Explanation: I think this would work for you. I leace comments in the answer.
The reasonable steps should the company have taken to prevent Jane from finding this information is to do a Vulnerability scanning or a A penetration test.
- How To defend Against Port Scanning try and use or Install a Firewall and the use of TCP Wrappers.
<h3>What is Vulnerability scanning?</h3>
This is a kind of passive reconnaissance techniques. This form of scanning is the process of auditing a said network. A vulnerability scanner is one that looks into the network or application to see issues but they do not attempt to exploit any vulnerabilities that is seen.
A penetration test (pen test) is known to be a form of ethical hacking that entails one to think like an attacker and find out ways to penetrate the target's security systems. This aim to:
- Verify a threat exists.
- Bypass security controls.
- Actively test security controls.
- Exploit vulnerabilities.
Learn more about penetration test from
brainly.com/question/26555003