1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
11Alexandr11 [23.1K]
3 years ago
7

There are two main advantages to using multiple threads in a process: 1) Less work involved in creating a new thread rather than

a new process 2) Communication among threads within the same process is simplified. Briefly explain how threads give these advantages. Is it also true to say that context switching between two threads in the same process involves less work than switching to a thread in a different process?
Computers and Technology
1 answer:
Brums [2.3K]3 years ago
7 0

Answer:

Thread is a light weight where as Process is a heavy weight in nature

Explanation:

A process can use to accomplish complex tasks which involves utilization of more system resources. Thread is  part of process which is used to accomplish some smaller task. Thread is light weight and involves utilization of less no of resources.

A process can have more than one thread for execution. we can execute these threads in a process parallelly. This is known as Multi Threading.

There are Mainly 2 Advantages to using multi threads in a process

Less work Involved in creating New Thread rather than a New process: this is because all threads in a process use same address space so it is very easy to communicate and operate these threads in a process. Each process is used separate address space so if we want to create another process then it involves utilization of more resource so more overhead

Communication among threads in same process also simplified as these are using same address space

You might be interested in
Several NEC® sections contain the requirement to size conductors and overcurrent devices at 100 percent of the noncontinuous loa
9966 [12]

Answer:

125 percent of continuous load

Explanation:

8 0
2 years ago
Can someone please help me! It’s due Thursday!
Eva8 [605]

Answer:

if the input is zero the out put is 1

Explanation:

because if you think about it if the input was 1 the output would be zero

7 0
2 years ago
You cannot then move and resize the control on the form as desired with your mouse TRUE OR FALSE​
Sindrei [870]

Answer:

False

Explanation:

4 0
2 years ago
Read 2 more answers
Examine the following output:
zepelin [54]

Answer:

a. tracert

Explanation:

Tracert is a computer network diagnostic demand which displays possible routes for internet protocol network. It also measures transit delays of packets across network. The given output is produced by a tracert command.

8 0
3 years ago
Technologies that function within the established system are called
vesna_86 [32]
<span>Authorizing technologies are technologies that controls the use of system and network resources through authentication and authorization. 
</span><span>Enabling technologies are innovation technologies that drive radical change in the capabilities of a user or culture.
</span>Obstructing technologies include blocking<span> and filtering, content manipulation, attacks.
</span>Preemption means "prior seizure of" and preemptive technologies <span>take control of the operating system from one task and giving </span>it<span> to another task.
</span><span>Technologies that function within the established system are called enabling technologies.</span>
8 0
2 years ago
Other questions:
  • Problem 2 (40 points)-Write a program. Submit a file named weight.cpp Create a program that continuously allows a user to enter
    5·1 answer
  • Information management examines the organizational resource of information and regulates its definitions, uses, value, and distr
    11·1 answer
  • Can someone please help me write a code for this
    7·1 answer
  • A hard drive cannot be partitioned until the device _________ is set.
    15·1 answer
  • How does an agile team maintain requirement?​
    9·2 answers
  • A technician wants to consolidate and log specific alerts from network devices into a database so maintenance tasks and potentia
    11·1 answer
  • When using the Common Internet File System (CIFS), which security model does not require a password to be set for the file share
    7·1 answer
  • If you would like to give another user permissions on your mailbox or to particular folders within your mailbox, which role shou
    10·1 answer
  • What are the main dimensions of information system and their components
    13·1 answer
  • Type the correct answer in each box. Spell all words correctly, and use numerals instead of words for numbers. If necessary, use
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!