1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
guajiro [1.7K]
3 years ago
7

1. 9.4. For process scheduling, does a low-priority value represent a low priority or a high priority?

Business
2 answers:
sergeinik [125]3 years ago
7 0

Answer:

Priority programming is a process programming method based on priority. In this technique, the developer chooses the tasks to work according to priority, which is different from other types of programming, for example, a simple round-robin.

On UNIX and many other systems, higher priority values represent lower priority processes. Some of the systems, such as Windows, use the opposite convention: a higher number means a higher priority

Explanation:

Priorities can be dynamic or static. Static priorities are assigned during creation, while dynamic priorities are assigned according to the behavior of the processes while they are in the system. To illustrate, the planner could favor intensive input / output (I / O) tasks, allowing expensive requests to be issued as soon as possible.

Priorities can be defined internally or externally. Internally defined priorities make use of a measurable amount to calculate the priority of a given process. On the contrary, external priorities are defined using criteria beyond the operating system (OS), which may include the importance of the process, the type and sum of the resources used for the use of the computer, user preferences , trade and other factors such as politics etc.

mafiozo [28]3 years ago
3 0

Answer:

Priority programming is a process programming method based on priority. In this technique, the developer chooses the tasks to work according to priority, which is different from other types of programming, for example, a simple round-robin.

On UNIX and many other systems, higher priority values represent lower priority processes. Some of the systems, such as Windows, use the opposite convention: a higher number means a higher priority

Explanation:

Priorities can be dynamic or static. Static priorities are assigned during creation, while dynamic priorities are assigned according to the behavior of the processes while they are in the system. To illustrate, the planner could favor intensive input / output (I / O) tasks, allowing expensive requests to be issued as soon as possible.

Priorities can be defined internally or externally. Internally defined priorities make use of a measurable amount to calculate the priority of a given process. On the contrary, external priorities are defined using criteria beyond the operating system (OS), which may include the importance of the process, the type and sum of the resources used for the use of the computer, user preferences , trade and other factors such as politics etc.

Explanation:

≡≡≡≡≡≡≡≡≡≡≡≡≡≅≅≅≅≅≅≡≡≡≡≡≡≡≡≡≡≡≡≡

WHAT SHE SAID IM SO SRY L M A O

You might be interested in
assume that you provide your services in a company as its HR representative you must create the code of conduct manual for the c
muminat

The conduct code or a manual basically has to define the ways in which people must act in the company.

Explanation:

Every company has a set of standards and how the work culture exists in their company.

This is often a direct inference of the practices of their company in the market and what their place is according to it.

It also depends on what industry the company is a part of.

Thus, the manual makes sure there is a directive way of understanding the rules of conduct of every worker within a company and even for the managers and executive there exists this way of understanding what it is about.

3 0
3 years ago
An authentication token is a(n):____________
bezimeni [28]

Answer:

The correct answer is:

device the size of a credit card that contains access permission data. (A)

Explanation:

An authentication token, also known as a security token is a device used to authorize access to a network service. Tokens use the two-factor authentication method to ensure security of a system. Usually the authentication devices have access pins before access to the main tokens, and tokens are unique sets of numbers that uniquely identifies a user in a service, and they are changed frequently, usually within a 5-minute period.

5 0
3 years ago
Percy Corporation was formed on January 1. The corporate charter authorized 100,000 shares of $10 par value common stock. During
dimulka [17.4K]

Answer:

paid in capital in excess of par value = $2000

and There will be a debit to Organisation expenses for $4,700

Explanation:

given data

charter authorized = 100,000 shares

common stock = $10 par value

issued  = 270 shares      

payment = $4,700        

solution

we know here that

Paid up value of the stock = $10 per share

and here shares issue to the attorney satisfying the organisation expenses is 270 shares

so common stock = 270 shares × $10

common stock =  $2700

so paid in capital in excess of par value = $2000

and There will be a debit to Organisation expenses for $4,700

8 0
3 years ago
Your company sells a variety of NFL logo t-shirts for various teams for $15. Your rental cost of the silk-screening equipment is
Zina [86]

Answer:

The company should print the 3,000 units of Tennessee  as they will yield a gain for 3,000 dollars.

Because it faces economies of scale it should sale for as much as it can from a given pattern

Explanation:

Profit: revenue - variable cost - fixed cost

Profit =   15*Q - 8*Q - 18,000

Profit =          7Q- 18,000

3,000 Tennessee shirts x $7 contribution per shirt - 18,000 setup cost

profit: 21,000 - 18,000 = 3,000

Profit maximization: Marginal revenue = marginal cost

Total Revenue: 15 x Q

dTR' /dQ = 15

dTR''/dQ = 0

cost function: 18,000 + 7Q

dC'/dQ = 7

dC''/dQ = 0

Sport Tee faces a economie of scale their cost do not increase over time. Sport Tee should sale as many shirt as it possible can

8 0
2 years ago
Nicole transferred a negotiable instrument to Andy. Andy later sues Nicole alleging a breach of presentation warranty. What coul
Gemiola [76]

Answer Not claiming the instrument hes sending

Explanation:

4 0
2 years ago
Other questions:
  • At the equilibrium price, the quantity of the good that buyers are willing and able to buya. is greater than the quantity that s
    12·1 answer
  • Technician A says that many oil pumps are driven directly off the front of the crankshaft. Technician B says that others are dri
    6·1 answer
  • Roosevelt, the Clayton Antitrust Act, and the Federal Trade Commission kept unions under control. True False
    9·1 answer
  • Exercise 6-8 Petty cash fund with a shortage LO P2 Waupaca Company establishes a $350 petty cash fund on September 9. On Septemb
    10·1 answer
  • Wilson's Winter Woolens manufactures jackets and other wool clothing. A certain designed ski parka requires the following: Direc
    11·1 answer
  • Which of the following statements is CORRECT regarding deciding whether an alcohol sale is legal?
    9·2 answers
  • The company is deciding whether to drop product line F because it has an operating loss. Assuming fixed costs are​ unavoidable,
    7·2 answers
  • A furniture dealer purchased a desk for $150 and then set the selling price equal to the purchase price plus a markup that was 4
    6·1 answer
  • State elements of business plan?
    13·1 answer
  • An unlicensed property manager can do all of the following except: Maintenance Showing units Negotiating lease terms Furnishing
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!