1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
djverab [1.8K]
3 years ago
5

____ are commonly used for communication between OS components, for queuing requests to an OS service, and for exchanging messag

es between components in a large program. a. Information processes b. Information controls c. Information networks d. Information systems
Computers and Technology
2 answers:
timurjin [86]3 years ago
8 0

Answer: The options are given below:

a. sockets

b. packets

c. pipes

d. procedures

The correct option is C. Pipes.

Explanation: In practice, a pipe is a medium of connection between two processes, whereby, the standard output from one process becomes the standard input of the other process.

In computer programming, a pipe is a simple technique for passing information from one program process to another. What this means is that, a pipe passes a parameter such as the output of one process to another process which accepts it as input.

vekshin13 years ago
3 0

Answer:

C. Pipes

Explanation:

Pipes are medium of communication between two or more interrelated processes. It is used for communication between operating system components. It is also used in exchanging messages between components of large programs. It implements interprocess communications through an interface. It passes information from one program process to another.

You might be interested in
When naming a file you should use the _____________ instead of a space in a filename.
larisa [96]

Answer:

_ or -

Explanation:

I've seen it both ways, but I've seen _ being used more. sorry its not an exact answer

8 0
4 years ago
Which aspects of a project do project makers oversee?
Phantasy [73]
Some people look over the extra details needed in the project.
3 0
4 years ago
Read 2 more answers
#A year is considered a leap year if it abides by the #following rules: # # - Every 4th year IS a leap year, EXCEPT... # - Every
lara [203]

Answer:

To check if the year comes under each 100th year, lets check if the remainder when dividing with 100 is 0 or not.

Similarly check for 400th year and multiple 0f 4. The following C program describes the function.

#include<stdio.h>

#include<stdbool.h>

bool is_leap_year(int year);

void main()

{

int y;

bool b;

 

printf("Enter the year in yyyy format: e.g. 1999 \n");

scanf("%d", &y);     // taking the input year in yyyy format.

 

b= is_leap_year(y);  //calling the function and returning the output to b

if(b==true)

{

 printf("Thae given year is a leap year \n");

}

else

{

 printf("The given year is not a leap year \n");

}

}

bool is_leap_year(int year)

{

if(year%100==0)   //every 100th year

{

 if(year%400==0)   //every 400th year

 {

  return true;

 }

 else

 {

  return false;

 }

}

if(year%4==0)  //is a multiple of 4

{

 return true;

}

else

{

 return false;

}

}

Explanation:

Output is given as image

5 0
3 years ago
The information security organization performs a significant role in the implementation of solutions that mitigate risk and cont
sergiy2304 [10]

Answer:

Subject matter experts

Explanation:

Because the security organization institutes the procedures and policies to be executed, they occupy the role of Subject matter expert.

A subject matter expert is a person with a thorough and deep knowledge of a particular process, function, technology, machine, material or type of equipment. Such a person is an expert on that subject.

Therefore the information security organization occupies the role of Subject matter expert.

6 0
4 years ago
For local travel addresses and street names should be
saul85 [17]
Capitalized  and properly spelled 

8 0
4 years ago
Other questions:
  • Egyptian hieroglyphs were part of a writing system used by the ancient Egyptians. What type of graphic design elements did they
    13·1 answer
  • This program outputs a downwards facing arrow composed of a rectangle and a right triangle. The arrow dimensions are defined by
    8·1 answer
  • What are the best data structures to create the following items? And why?
    13·1 answer
  • Technology has proliferated in Kenya and Somaliland, with text messages used to replace cash, creating mobile money use that, on
    11·1 answer
  • Which term collectively describes hard disks, CDs, and flash drives?
    11·2 answers
  • ____________________ is the primary code humans use to communicate. (Points : 1
    9·1 answer
  • 22
    15·1 answer
  • Waygate's residential Internet modem works well but is sensitive to power-line fluctuations. On average, this product hangs up a
    6·1 answer
  • Dr. Wayne is trying to developing techniques to cure Parkinson’s disease by inserting genetic material into patients’ cells to c
    12·1 answer
  • Which of the following are causes of a run-time error. Choose all that apply.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!