1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dlinn [17]
3 years ago
11

Communication of a message between two processes implies which of the following? (A) Synchronization (B) Atomic operation (C) Bl

ocking of the process (D) Unblocking of the process (E) None of the above
Computers and Technology
1 answer:
solong [7]3 years ago
6 0

Answer: Synchronization

Explanation:

In communication of messages between processes we have a mechanism called as the interprocess communication (IPC) using which it is required to achieve synchronization between the process. These synchronization helps to prevent collision of the processes for the shared resources. Examples can be of mechanism of producer consumer problem .

You might be interested in
Circuitry can be either basic or ___________.
Sonja [21]
I think it would be A. Ohm's law.
hope this helps.
6 0
3 years ago
Read 2 more answers
in python, using the simplest form the print_seconds function so that it prints the total amount of seconds given the hours, min
PolarNik [594]

Answer:

I'm guessing you want a function so...

def print_seconds(hours, minutes, seconds):

seconds += 3600 * hours + 60 * minutes

print(seconds)

return 0

Hope this helps. :)

4 0
3 years ago
Attacking systems by exploiting otherwise unknown and unpatched vulnerabilities is also known as:
Nostrana [21]

Answer:

Zero-day exploits

Explanation:

Zero-day exploits refers to recently found vulnerabilities in a computer software program that has been in existence but was hitherto not known and addressed by the software security experts, however, these vulnerabilities were known to hackers. While the existence of these "loop-holes" in the software can go on unnoticed for several years, hackers can take advantage of it to cause harm to the computers' programs and data.

When these attacks occur, it is called a zero-day because the attack took place on the very day that the loop-hole was discovered in the software. So exploitation has already taken place before a fix is carried out.

5 0
3 years ago
Which of the following is not an operating system? Linux Nexus Mac OS Windows
laila [671]
I belive Nexus is not a Operating system, I am not a pro at knowing all of the operating system.
7 0
3 years ago
what does it mean when my brainly just tells me theres no answers for any of my questions i have the plus and ive been using it
VashaNatasha [74]
Well it might be a glitch or it didn’t save.
3 0
3 years ago
Other questions:
  • "under the control panel, what console contains print management, computer management, and event viewer?"
    11·1 answer
  • Which of the following statement is true?
    5·1 answer
  • What is the safest way to install a new flash drive
    7·2 answers
  • Advantages and disadvantages of technology
    13·1 answer
  • You have just finished installing a network adapter adapter and booted up the system, the drivers. You open File Explorer on a r
    13·1 answer
  • Pls due soon
    13·1 answer
  • After Alexandra installed new software, she set it up to perform in a certain way. She is _____. changing the peripherals linkin
    10·1 answer
  • Edhesive 3.4 practice 1
    9·1 answer
  • Pro and Cons of Artificial Intelligence in Art <br><br> You must have 3 statements in each
    14·1 answer
  • Can you help me with my homework what should i do
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!