1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ann [662]
4 years ago
8

Which of the following is an advantage of batch processing?

Computers and Technology
1 answer:
alina1380 [7]4 years ago
8 0

Answer:

it can balance computing resources by time

Explanation:

this this is as it involves multiprogramming

You might be interested in
Carmen has met new people online that she enjoys talking to. One of these people has asked her to meet at the park in person and
slavikrds [6]

Answer:

Don't go to the park!!

Explanation:

You don't know the person personally and they could be acting and hurt you. Especially if they tell you not to tell someone. So don't go!

8 0
3 years ago
? An attempt to harm damage or cause threat to a system or network is broadly termed as
Radda [10]

Answer:

A cyber attack or hacking

Explanation:

6 0
3 years ago
Page break preview identifies manual page breaks with a dotted blue line and automatic page breaks with a solid blue line.
Mashutka [201]
Page break preview identifies manual page breaks with a dotted blue line and automatic page breaks with a solid blue line.

a. True
7 0
3 years ago
Why did it take hundreds
levacccp [35]
Before that there was no way for the image to be recorded and fixed on a surface
5 0
3 years ago
I don't know what to do, anyone there?​
s2008m [1.1K]
I’m here, hello. . . . . . .
3 0
3 years ago
Other questions:
  • Consider the following method:
    8·2 answers
  • Olivia has developed a great presentation with a distinct purpose and excellent content. She delivered it in a workshop and got
    9·1 answer
  • Columns can be added to a page in the page layout tab in the blank grouping
    10·2 answers
  • Sharon is a network engineer for your firm and is investigating the WAN connection into the hot site. In the event of operations
    13·1 answer
  • A key field is used to _____. enter a password uniquely identify records merge data list the most important information
    12·2 answers
  • Why are computers complicated?
    15·1 answer
  • What are your undertale + au ships?
    15·1 answer
  • What is the output of the following code?
    5·1 answer
  • Mention any
    14·1 answer
  • Does the source MAC address match your PC interface?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!