1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mademuasel [1]
3 years ago
11

The region of the sky which reflects radio waves around the world is the .

Computers and Technology
1 answer:
aivan3 [116]3 years ago
6 0

The ionosphere reflects those waves

You might be interested in
What is commodity? explain
timama [110]
A raw material or primary agricultural product that can be bought and sold, such as copper or coffee.
6 0
3 years ago
What are the top and side margins for a letter typed in standard format?
BabaBlast [244]
Should be 1’ on each side
4 0
3 years ago
"If a program attempts to modify (or, sometimes, even to read) the contents of memory locations that do not belong to it, the op
Monica [59]

The operating system's memory protection routine intervenes and (usually) terminates the program if a program attempts to modify (or, sometimes, even to read) the contents of memory locations that do not belong to it.

Further Explanation

The memory protection routine is most commonly used in multi-programmed systems to prevent one process from affecting the availability of another. When a user opens up multiple processes, by default, they usually reside at the same time in the main memory. Sometimes, a program may attempt to access, modify, or read memory locations allocated to other processes. When this happens, the memory protection program jumps in. Keep in mind that the memory manager somehow works hand in hand with the memory protection routine. It protects the OS from being accessed by other processes and these processes from accessing one another. In addition, it helps save memory by allocating the same amount of memory to all running processes. The memory protection program, on the other hand, should be able to allow controlled sharing of memory among different processes and will usually terminate a program that tries to modify content of memory locations of that does not belong to it.

Learn More about Memory management

brainly.com/question/14241634

#LearnWithBrainly

3 0
3 years ago
each term to the appropriate definition. DBMS data mining hash file index key field locking protocol relation roll back schema S
ikadub [295]

Answer:

1. DBMS

C. <em>A storage system that provides efficient access to randomly chosen items</em>

G. <em>Performs database operations requested by application software</em>

2. data mining

B. <em>The process of extracting hidden information</em>

3. hash file

A. <em>A. means of locating a particular record within a file</em>

4. index key field

F. <em>An item used to identify records uniquely</em>

5. locking protocol

E. <em>A system to guard against database errors due to performing transactions concurrently</em>

6. relation

D. <em>A structural unit (with rows and columns) in a popular database model</em>

7. roll back schema

I. <em>A "road map" of a particular database's design</em>

J. <em>To "unwind" a transaction</em>

8. SQL

H. <em>A popular language that implements relational database operations.</em>

5 0
3 years ago
I need some cool things to do with windows command prompt.
STatiana [176]
I programmed in batch before so I know a lot of things!

You can ping a website to test your latency.

ping google.com

I have a ton of tricks in cmd (Command Prompt). Message me if you want.





7 0
3 years ago
Other questions:
  • You're working at a large industrial plant and notice a tag similar to the one shown in the figure above. Which of the following
    5·1 answer
  • Having a good credit score is important because:
    7·1 answer
  • When CPU failed what will happen?
    10·1 answer
  • A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The c
    14·1 answer
  • How do you record yourself on a macbook pro
    9·1 answer
  • If(moreDate == true)
    7·1 answer
  • Which elements are in the Sort dialog box? Check all that apply.
    9·1 answer
  • Of the following online activities, identify the TWO that are most likely to be affected by bandwidth quality
    11·1 answer
  • What will result if the following code is used in an HTML file? New Title
    13·2 answers
  • Is TCP really more secure than other L4 protocols by default?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!