1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natulia [17]
3 years ago
11

Using the following table as your starting point for each algorithm SJN Given the following information: Job: A B C D E Arrival

Time: 0 2 3 6 10 Time burst: 4 2 1 10 2 The turnaround time for a job is the completion time minus the arrival time what is the turnaround time for: Job A: Job B: Job C: Job D: Job E : What is the average turn around time for this algorithm with these jobs? The wait time for a job is the turn around time minus the burst time what is the wait time for: Job A: Job B: Job C: Job D: Job E: What is the average wait time for this algorithm with these jobs?
Please answer

Computers and Technology
1 answer:
victus00 [196]3 years ago
7 0

Answer:

Please check the attachment,

The average turnaround time is 4.8 and average waiting time is 1.

Please note: Exit time is same as completion time.

Explanation:

Please check the attachment.

You might be interested in
If the speakers are not working on a laptop, what could be the problem besides the speakers?
Elena-2011 [213]

Answer:

Sound card

Explanation:

In computer or laptop music or sound files are stored in digital form. Sound card is the the device that is used to convert the digital form of music into analog to produce the signal that is compatible with speaker or microphone.

If the speakers are not working on the laptop, means there is no sound produced on speakers. It means that sound card is not working properly.

8 0
3 years ago
Program 3.Study the code carefully and write out the line where there is error, debug it and write out the correct code
stich3 [128]

Answer:

Several errors:

  • 0 where ( ) was intended (probably OCR problem)
  • space between As and Double
  • Single quote in stead of double quote in text string
  • $ in stead of & near Math.sqrt
  • missing spaces around "is" for proper formatting

5 0
3 years ago
Signe wants to improve the security of the small business where she serves as a security manager. She determines that the busine
jek_recluse [69]

Answer:Obscurity

Explanation: Security through the obscurity is the mechanism that is used for the security purpose in an operating system by inducing the confidentiality in the internal parts of the operating system.

The functioning of the security through obscurity(STO) works by hiding the  flaws and errors related to security  of the operating system.Thus , Signe is willing to use obscurity system.

 

6 0
4 years ago
Roark has just joined a company and in his role as a lead analyst, he will be responsible for determining which systems developm
hram777 [196]

Answer:

Agile/adaptive methods.

Explanation:

The user has just decided to join a firm and will also be accountable to determine whether that system development technique that group uses to establish the latest software for a significant medical distributor to his position as just a lead analyst.

After that, he consumes a week for the purpose to understand his group members for reason to know their strengths and weakness and how would they work under pressure.

So, the following method is required for him to understand about the disadvantages of each of them.

4 0
3 years ago
Which of the following is not one of the four methods for classifying the various instances of malware by using the primary trai
BlackZzzverrR [31]

Answer: Source

Explanation: The malware is the software persisting malicious approach to cause the damage/loss.The primary trait of the malware are infection,concealment,etc.

The concealment refer to the malware such as the Trojan horse, and other viruses that has only purpose to cause the malfunctioning in the system.The virus that get into the other software and then damage the system in known as the infectious malware .

The circulation is the transferring of the virus in the circular manner between the system for the damaging.Thus,the only trait that is not the part of the malware is source.

4 0
3 years ago
Other questions:
  • Let's say you're creating a search stream in your hootsuite dashboard, to find mentions of the phrase vacation holiday getaway.
    15·1 answer
  • Which categories format cells
    14·2 answers
  • Mobile computing has two major characteristics that differentiate it from other forms of computing. What are these two character
    8·1 answer
  • Be my friend plzzzzzzz
    7·2 answers
  • Assuming there are 100 million households in the US, and that each household has two HDTVs, and that each TV is used to watch 4
    15·1 answer
  • What X coordinate does the center of a game begin at?
    9·1 answer
  • Design a class named Person and its two subclasses named Student and Employee. Make Faculty and Staff subclasses of Employee. A
    13·1 answer
  • If my usb could unlock my computer with a tool then could i be able to open it using ip unlock
    9·1 answer
  • Is Filmora 9 or Final Cut Pro Better for personal use?
    12·1 answer
  • Identify the following​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!