1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Annette [7]
4 years ago
10

If many programs are kept in main memory, then there is almostalways another program ready to run on the CPU when a page faultoc

curs. Thus, CPU utilization is kept high. If, however, we allocate alarge amount of physical memory to just a few of the programs, theneach program produces a smaller number of page faults. Thus, CPUutilization is kept high among the programs in memory. What would the working set algorithm try to accomplish, and why?(Hint: These two cases represent extremes that could lead toproblematic behavior.)
Computers and Technology
1 answer:
notsponge [240]4 years ago
7 0

Answer:

With the analysis of the case, we can infer that regarding the model or algorithm of the work set, we want to reduce page faults in each individual process, guaranteeing that the set of pages are included before executing the process.

There are things that should not change, such as the set of pages used in the process or the working set as they are called, they could only change if a program moves to a different phase of execution. In this way the most suitable and profitable approach is proposed for the use of time in the processor, by avoiding bringing oagines from the hard disk and instead of this the process is executed, because otherwise it would take a long time what was observed in decreased performance.

Regarding what was mentioned in the question, it follows that 2 extremes lead to a problematic behavior, to define the first as a page fault and the second refers to a small number of processes executed.

You might be interested in
Consider the following code segment.
Bingel [31]

Answer:

A.)

arr[0] = 10;

arr[1] = 10;

Explanation:

Given the array:

arr = {1,2,3,4,5}

To set the first two elements of array arr to 10.

Kindly note that ; index numbering if array elements starts from 0

First element of the array has an index of 0

2nd element of the array has an index of 1 and so on.

Array elements can be called one at a time using the array name followed by the index number of the array enclosed in square brackets.

arr[0] = 10 (this assigns a value of 10 to the index value, which replace 1

arr[1] = 10 (assigns a value of 10 to the 2nd value in arr, which replaces 2

3 0
3 years ago
Which of the following are parts of the Physical Layer?
Snowcat [4.5K]

Answer:

Physical layer is the first layer of OSI model.  The detail about physical layer and its parts is given below in explanation section.

Explanation:

The physical layer is the lowest and first layer of the Open Systems Interconnection Model (OSI). The physical layer is used for the transmission of data in bit forms. For transmission of data between devices, it uses the transmission medium that is either wired or wireless.

In the wired cable the component of the psychical layer include cable and connectors that are implemented for carrying data from one place to another or simply to transmit data between two connected devices. The wireless transmission medium is used to transmit data in the form of electromagnetic signals for carrying data into a stream of bits. Over past advancements in networking technologies, rapid growth has been seen in wireless data transmission and Wi-Fi and Bluetooth communication are few names of it.

Components/Parts of Psychical Layer

In the physical layer, the hardware components used it in are the network interface cards, connectors and interfaces, intermediate devices, modems, and cables to facilitate the transmission of data between devices or from source to destination.

  • The network interface card (NIC)

NIC is a component installed in the computer to connect it to any available devices over the network.

  • Connectors and Interfaces

Connectors and interfaces are used to connect cables that are being used for transmission of data from one source to another. The decision to choose connectors and interfaces depends on the type of cable. Typical examples are RJ-45, RJ-11, V.35, HDMI, etc.

  • Cables

Cables are the physical components of the physical layer that carry optic or electromagnetic signals for transmission of data from source to destination in the network.

  • Intermediate devices

The intermediate devices are hubs and repeaters etc. The functions of these devices are to amplify or generate the signal at the intermediate point in a network.

6 0
4 years ago
Barry discovers that an attacker is running an access point in a building adjacent to his company. The access point is broadcast
qwelly [4]

Answer: Option (A) is correct

Explanation:

Evil twin is known as a fraudulent point of access in a Wi-Fi which tends to  appear to be honest and legitimate but is known as a set up to oversee on the wireless communications. Evil twin is referred to as the WLAN equal of a phishing scam.  This kind of attack is mostly used in order to steal passwords of an unsuspecting users, that is done either by by phishing or by monitoring the connection, this mostly involves developing a fake web site and thus luring people.

8 0
3 years ago
What is an algorithm? An executable file that has been converted into machine language A set of markup instructions A set of ins
mario62 [17]

Answer:

A set of instructions to meet a requirement of some kind

Explanation:

An algorithm is a set of instructions to meet a requirement of some kind, not all the algorithm are for computers, we can form an algorithm of how to make a cake.

5 0
3 years ago
What are examples of macro events related to a form? Check all that apply.
Westkost [7]

Answer:

A form is closed

A form is resized.

A form is opened

A user presses a key

A user moves the mouse

Explanation:

There are different events in a form, and we can use them in different situations like:

  • We can use On Resize to resize our form.
  • If we On Load the form will be displayed.
  • On Clicked, If there was a click in an object
  • On Unload to close the form.
  • On Mouse Enter and On Mouse Leave, in this case, the mouse enters or leaves the object.

6 0
4 years ago
Other questions:
  • Write a function decimalToBinaryRecursive that converts a decimal value to binary using recursion. This function takes a single
    11·1 answer
  • Why is drafting important in every industry
    6·1 answer
  • What type of malware can, for example, locks up a user's computer and then display a message that purports to come from a law en
    9·1 answer
  • landon starts his computer and gets message, hard drive is not found. He was watching a movie the previous night, what might the
    6·1 answer
  • What is after gigabyte
    12·2 answers
  • 1
    7·1 answer
  • A pizza delivery restaurant decides to stop hiring drivers and start hiring cyclers to deliver its pizza. The restaurant thinks
    15·1 answer
  • Which of the following allows computers to communicate with each other? RAM NIC Hard drive Floppy disk
    11·1 answer
  • JAVA
    10·1 answer
  • A device is a program that must be installed in order for the peripheral device to be able to
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!