1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Setler79 [48]
3 years ago
7

Please help guys I'm so lost ​

Computers and Technology
2 answers:
PilotLPTM [1.2K]3 years ago
4 0

Answer:

The correct answer is C ( W * 5 )

slamgirl [31]3 years ago
3 0
The answer is C hope this helps
You might be interested in
Why will the standard replacement algorithms (LRU, FIFO, clock) not be effective in handling this workload for a page allocation
dusya [7]

Answer:

These algorithm keeps an eye on which page was used when. LRU assumes that the page that was recently used has more probability  

of being used or requested by the user. Thus, it keeps the pages that were recently used, when a new page is requested. If page  

fault occurs, the requested page is fetched and it replaces the page in cache which was last referenced earlier than any other page  

in the cache (or frame).The LRU associates a time with each page in the memory and the ones with the greatest value are replaced.  

It does not suffer from Belady’s anomaly. The page fault will be referred when 512 page frame are reached. This is the total length of the complete sequence.

FIFO replaces pages that come in cache firstly. FIFO stands for First in first out.  

(b) The FIFO replacement algorithm replaces the page which was first brought into the memory followed by the next and soon.  

This algorithm suffers from Belady’s anomaly. In First In First out (FIFO) page replacement scheme of page replacement, the requests  

are executed as they are received. When a new request is made of a page which is not available in the existing frames, then the requested  

page is acquired from the memory. The page in the first frame is replaced by the requested page. If again a request is made of a page not  

yet available in the frames, it is fetched from the memory and it replaces the second frame's page, and so on.  

There are total 500 frames given. The alternative approach which is better than clock algorithm, FIFO, and LRU is that the pages  

from 0 to 498 are set to the fixed frames. Thus, 499 frames are fixed and only one frame can vary.

Explanation:

6 0
3 years ago
Using C++, Write a full class definition for a class named Acc1, containing no constructors, functions, or data members (i.e., a
alexgriva [62]
Hi!

Okay, so - 

To make a C++ class, we have to use the keyword <em>class </em>followed by the class name, and a pair of curly braces which will be our <em>class body</em><em>. </em>

Our class body is what holds all of our constructors, functions, and data members. 

So, to write a completely empty class - we would just have to simply write:

<em>class Acc1 
</em>{

};

<em />Note -

All classes must end with a semi colon! This is just a standard rule we follow since it was how C++ has been defined. If you were to leave the semi colon out, you would get a compiler error! =)
4 0
3 years ago
Read 2 more answers
What part of the System Model is a Flow Chart primarily developed for?
Morgarella [4.7K]

A, I believe... I could be wrong

3 0
4 years ago
You are most likely to use<br> images for photos or digital paintings.
Lubov Fominskaja [6]

Answer: Digital Paintings

7 0
3 years ago
Consider the Palindrom class discussed in class. Which of the following is true? It uses one stack and one queue to find out if
yawa3891 [41]

Answer:

It uses a recursive method to find out if a string is a palindrome

Explanation:

Palindrome is a word or a sequence which is read same as backward as forwards. There are various method to find a palindrome. Palindrome can be determined recursively by identifying the first and last letters of the word. These first and last letter should be same. If they are same then the word or sequence is palindrome.

5 0
3 years ago
Other questions:
  • â________________ software can sometimes be used to decrypt a drive that is utilizing whole disk encryption.
    15·1 answer
  • When Twitter is used to gather a large group for a face-to-face meeting it is called a
    10·1 answer
  • From the following list choose all the tasks an operating system performs.
    5·2 answers
  • Why is fluency in information technology becoming increasingly important for many college majors?
    6·1 answer
  • What is contrast (in Photography)?
    14·1 answer
  • Assume the existence of a Building class with a constructor that accepts two parameters: a reference to an Address object repres
    7·2 answers
  • In addition to regular watch features, which two features are often found on smart watches?
    10·1 answer
  • An ip address contains four sets of numbers what are they called
    11·1 answer
  • An enhancement to a computer accelerates some mode of execution by a factor of 10. The enhanced mode is used 50% of the time, me
    11·1 answer
  • Which statement is true about hacking?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!