1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Llana [10]
3 years ago
14

An I/O-bound process ___________________________________________________ Select one: a. does not need CPU time b. spends less of

its time seeking I/O operations than doing computational work c. spends more of its time seeking I/O operations than doing computational work d. spends equal time seeking I/O operations and doing computational work
Computers and Technology
1 answer:
DiKsa [7]3 years ago
8 0

Answer:

Spends more of its time seeking I/O operations than doing computational work.

Explanation:

The I/O bound process are depend on Input and output speed. on the other hand computational work is associated with CPU bound processes. Therefore option "C" is better option for I/O bound processes.

You might be interested in
Which of the following tools and techniques shows theimpacts of one decision over another as well as the probability andcost of
Nezavi [6.7K]

Answer: Probability/impact risk matrix

Explanation: Probability/impact risk matrix is type of matrix that defines the probability as well as impact that depicts whether the risk is low ,high or moderate.

Impact matrix is sort of tool which helps in conversion of any plan into a action. Probability matrix help in defining the chances in defining the risk.The positioning of the impact value of risk is plotted  on the vertical axis and performance value on the horizontal axis.

Thus probability/impact matrix is the correct tool for the problem mentioned in the question.

6 0
3 years ago
Use a web browser to find three examples of static webpages and three examples of dynamic webpages, and note the URLs for each p
shepuryov [24]

Answer:

Static web pages are sent as it is at web server without being processed additionally.

Dynamic web pages content may change, and server hosting dynamic web pages return content after processing trough a program.

Examples of dynamic and static web pages are below

Explanation:

<em><u>dynamic websites</u></em>

f o o t y r o o m  (.co) It is a football website. Displays latest highlights and football stats. It is dynamic because it gives live match scores, as the scores change, content change as well.

a c c u w e a t h e r (.com) It shows weather information. It is dynamic because when requested, displays current weather information.

x e (.com)   It is a currency website. Dynamic because it shows live exchange rates.

<em><u>static websites</u></em>

s c i p y - l e c t u r e s (.org) It is a website about scientific python environment. It is static because it gives same content whenever requested.

d o g a c a n d u . b l o g s p o t (.com) it is a blog. Static because the requested content doesn't change unless the blogger adds a new story.  

z t a b l e (.net) It is a website about z-score values and includes z-tables. It is static because its displayed as it is.

5 0
3 years ago
The National Archives is part of the federal government, which means that its content:
RUDIKE [14]

Answer:

belongs to everyone.

Explanation:

A National Archive can be defined as the collection of data (informations) and documents by the government of a particular country for record keeping purposes.

Basically, these documents comprises of information about important and historical events that have happened in the country or events generally related with the country.

Hence, the National Archives is part of the federal government, which means that its content belongs to everyone. This is simply because the federal government is a government of the people, for the people and by the people. Thus, the ownership of governmental institutions or agencies belongs to the general public i.e the citizens of the country.

4 0
3 years ago
To create a public key signature, you would use the ______ key.
olya-2409 [2.1K]

Answer:

To create a public key signature, you would use the <u>_private_</u> key.

Explanation:

To create a public key signature, a  private key is essential to enable authorization.

A private key uses one key to make data unreadable by intruders and for the data to be accessed the same key would be needed to do so.

The login details and some important credentials to access user data contains both the user's public key data and private key data. Both private key and public key are two keys that work together to accomplish security goals.

The public key uses different keys to make data readable and unreadable.

The public key is important to verify authorization to access encrypted data by making sure the access authorization came from someone who has the private key. In other words, it's a system put in place to cross-check the holder of the private key by providing the public key of the encrypted data that needed to be accessed. Though, it depends on the key used to encrypt the data as data encrypted with a public key would require a private key for the data to be readable.

4 0
3 years ago
5 minutes speech on computer and it's impact​
yuradex [85]

Answer:

used for inter eliptics

7 0
3 years ago
Read 2 more answers
Other questions:
  • What file would you edit to restrict the number of simultaneous logins a user can employ??
    14·1 answer
  • 2. Billys teacher asked him to type a report about asian food. Which paragraph format should he use?
    12·2 answers
  • Briefly define "address space" and discuss its major tradeoffs (advantages/costs). What problem is it addressing?
    10·1 answer
  • This type of connection is best to use when downloading large files on a network.
    10·1 answer
  • In your own words, describe how a network administrator can use the OSI model to isolate a network problem.
    13·1 answer
  • Which data type is also called a binary object?
    9·2 answers
  • mta software development fundamentals You are creating an application that accepts input and displays a response to the user. Yo
    10·1 answer
  • Write a function:
    13·1 answer
  • What is the role of the memory in a computer ​
    11·1 answer
  • This provides an easy method for workers to use their computers. FAT FAT RAM RAM DOS DOS GUI
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!