1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Whitepunk [10]
3 years ago
15

If you have two tasks x and y, with y being a successor to x, if we mark x as undone (because it needs to be redone for some rea

son), then y will also need to be redone, as it might use the results of x.
To implement this, we will endow our scheduler with a redo method, which marks a task and any tasks that depend on it to be redone.
Computers and Technology
1 answer:
Ierofanga [76]3 years ago
7 0

Answer:

idk

Explanation:

sorry

You might be interested in
Use the following cell phone airport data speeds​ (Mbps) from a particular network. Find P10. 0.1 0.1 0.3 0.3 0.3 0.4 0.4 0.4 0.
sasho [114]

Answer:

P_{10} =0.1

Explanation:

Given

0.1, 0.1, 0.3, 0.3, 0.3, 0.4, 0.4, 0.4, 0.6, 0.7, 0.7, 0.7, 0.8, 0.8

Required

Determine P_{10}

P_{10} implies 10th percentile and this is calculated as thus

P_{10} = \frac{10(n+1)}{100}

Where n is the number of data; n = 14

P_{10} = \frac{10(n+1)}{100}

Substitute 14 for n

P_{10} = \frac{10(14+1)}{100}

P_{10} = \frac{10(15)}{100}

Open the bracket

P_{10} = \frac{10 * 15}{100}

P_{10} = \frac{150}{100}

P_{10} = 1.5th\ item

This means that the 1.5th item is P_{10}

And this falls between the 1st and 2nd item and is calculated as thus;

P_{10} = 1.5th\ item

Express 1.5 as 1 + 0.5

P_{10} = (1 +0.5)\ th\ item

P_{10} = 1^{st}\ item +0.5(2^{nd} - 1^{st}) item

From the given data; 1st\ item = 0.1 and 2nd\ item = 0.1

P_{10} = 1^{st}\ item +0.5(2^{nd} - 1^{st}) item becomes

P_{10} =0.1 +0.5(0.1 - 0.1)

P_{10} =0.1 +0.5(0)

P_{10} =0.1 +0

P_{10} =0.1

3 0
3 years ago
What is the recommended secure protocol for voice and video applications? secure real-time transport protocol (srtp) hypertext t
snow_tiger [21]
The recommended secure protocol for voice and video applications is the Secure<span> Real-time Transport </span>Protocol<span> (SRTP) protocol. SRTP is a Real-time Transport </span>Protocol (RTP) profile used to  to provide encryption, message authentication and integrity.
The default cipher of SRTP is the Advanced Encryption Standard<span> (AES) .</span>
8 0
3 years ago
The ________letter of the first word in the Complimentary Closing has a capital letter, everything else is keyed in lower case o
Alona [7]

Answer: enter

\

Explanation:

yes

5 0
3 years ago
What is the ls option to list entries by lines instead of by columns?​
gogolik [260]

Sometimes I just meet some Unintelligen ppl

7 0
3 years ago
The ________ model allows the owner of a resource to manage who can or cannot access the item. Owners maintain this access throu
blagie [28]

Answer:

Discretionary Access Control model

Explanation:

Discretionary Access Control (DAC) gives owners of a resource full control of objects/items they have created or been given access to, this also includes sharing the objects/items with other subjects. These owners have control over their data and maintain access through ACLs. The access-control list (ACL), is a list of permissions attached to an object in a computer file system.

The Owners can decide to grant other users access to their files, change their attributes, alter them, or delete them. DACs are discretionary because the owner can transfer information access to other users.

5 0
3 years ago
Other questions:
  • The concept of ____ refers to the idea that the internet is designed for all content to be treated equally.
    12·1 answer
  • Which statement is true about the elements of the interface of a presentation program? The status bar appears at the top of the
    14·2 answers
  • "To take advantage of these developments in the digital world, new approaches, concepts,instruments, and methods are needed, whi
    8·1 answer
  • Which statement is true about the purpose of a work in process constraint?
    15·1 answer
  • What is HTML? (list down any 5 points)
    12·1 answer
  • Correct all the mistakes in the following sentence:
    15·2 answers
  • Create an application that determines the final cost of food items and non-food items, assuming only non-food items are taxed. T
    8·1 answer
  • QUICK HELP ME PLEASE
    9·1 answer
  • Please help me asapppp!​
    8·2 answers
  • Im a beginner programmer. what languages should i learn and how do i get better
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!