1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Olegator [25]
3 years ago
8

The roll out, roll in variant of swapping is used ____."

Computers and Technology
1 answer:
Sindrei [870]3 years ago
4 0

Answer:

C.) for priority-based scheduling algorithms

Explanation:

for priority-based scheduling algorithms

You might be interested in
Which statement about dialogues is NOT correct? Select one: A. Users should be able to control the direction of speed of dialogu
Gennadij [26K]

Answer:

Option B is not correct

Explanation:

Dialogues become problematic when they appear automatically because of high level incompatibility

3 0
3 years ago
Software, also called a(n) ____________________, consists of a series of related instructions, organized for a common purpose, t
Naddika [18.5K]
Software is also called a program or an application.
8 0
3 years ago
Which of the following situations best illustrates the process of authentication?a.A Web site sets users' passwords to expire ev
Paladinen [302]

Using an electronic signature on official documentation best illustrates the process of authentication

Further explanation:

The continuous rise of Electronic signatures has made it easier for people to accept signed documents by email or through electronic devices. One good example of electronic signatures is the implementation of digital signatures which broadly encompasses many types of electronic signatures out there. Digital signatures are unique to each signer and follow a standard authentication protocol called PKI. PKI use mathematical algorithms to generate what are known as private and public keys.

A good example is Bob and Jane. Jane sends an eSignature document using her private keys. Bob receives this document with an attached copy of Jane’s public key. The signature will be considered valid if the public key decrypts the signature correctly.

Learn more about eSignatures and electronic signatures.

brainly.com/question/8776017

#LearnWithBrainly

7 0
4 years ago
In​ 1972, gordon bell formulated​ bell's law, which states​ ________.
Masja [62]

I guess the best option is letter D.

In 1972, Gordon Bell formulated Bell's Law, which states a new computer class forms roughly each decade establishing a new industry.

4 0
3 years ago
3. Which major NIMS Component describes systems and methods that help to ensure that incident personnel and other decision maker
mario62 [17]

Answer:

The answer to the following question is Communications & Information management .

Explanation:

National Incident Management System (in short NIMS), is the comprehensive and national approach to how state, tribal, territorial, federal and local responders reacts and responds during the emergency.

The components of NIMS are:

  • Command and Management,
  • Resource Management,
  • Preparedness,
  • Communication & Information,
  • Ongoing Management and Maintenance and
  • Supporting Technologies.
8 0
3 years ago
Other questions:
  • A thick black line around the outside edge of a page is a _____.
    6·2 answers
  • I will give the brainly or whatever its called
    15·2 answers
  • Wireshark capture files, like the DemoCapturepcap file found in this lab, have a __________ extension, which stands for packet c
    6·1 answer
  • • Two advertisers A and B
    8·1 answer
  • You can use the results from a search on a database in all of these ways except to ____.
    11·2 answers
  • Which item would you most likely keep in a database
    9·2 answers
  • An
    9·1 answer
  • You have to display or connect to network shares on remote computers. Which command-line utility will you use to accomplish the
    10·1 answer
  • Computers that are close to one another are connected to form a LAN
    7·1 answer
  • ...................You like swamps
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!