1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lesantik [10]
3 years ago
5

What do you understand by multitasking?Explain cooperativemultitasking ?

Computers and Technology
2 answers:
Nadusha1986 [10]3 years ago
4 0

Answer: Multitasking is the ability of the operating system by which a processor is able to process multiple task at the same time.

Cooperative multitasking is non preemptive multitasking where the processor is assigned to a single process and does not preempt  until it completes its jobs or moves to a waiting state.

Explanation:

In Multitasking jobs are executed at a faster rate than as many jobs or tasks can be assigned to the processor at the same time.

In cooperative multitasking due to the non preemptive nature a single job could be assigned to the cpu at a time.  

ki77a [65]3 years ago
3 0

Answer:

     The term multitasking refers to the act of performing two (or more) tasks at the same time. In our present society this concept has a common place in the lives of the vast majority of people. Few jobs do not require, at some level, any form of multitasking. What's more, in a 100% connected society, the immediacy of interactions and access to information keeps our attention constantly shifting, and smartphones, added to social networks, are everyday tools that keep us constantly multitasking wherever we go. .

    An important use of coroutines is the provision of a multitasking environment where multiple "tasks" (threads) can execute concurrently, sharing processor usage. Unlike a thread-based environment, which is typically preemptive (ie, tasks involuntarily lose control of the processor at any time of their execution), a coroutine-based environment is basically cooperative, meaning that tasks voluntarily relinquish the processor control.

    The cooperative multitasking style has the advantage that breakpoints are well-defined because you know exactly when control moves from task to task. So there is not that big bottleneck that we saw with context switching, where all registers need to be saved, among others. A more elegant, efficient and green solution.

Explanation:

You might be interested in
How many mb are in a gb?
frosja888 [35]

Answer:

1000 megabytes are in a gigabyte

Explanation:

3 0
2 years ago
WordArt styles allow you to add ____.
maria [59]
As for this problem, the most probable and the most likely answer to this would be it depends on the person or the user of it since there aren't any options presented with the problem.

WordArt is there to be of use during presentations, during discussions, and other things. On the other hand, as the technological advancement takes leaps and bounds going forward, this utility seems to be underused and isn't expected to give a more impact to the reader or to the recipient of such document that contains it. This is typically used for people that aren't too familiar yet, as to how to utilize other programs to enhance their documents and files.
3 0
3 years ago
you have been tasked with configuring a digital information station in the office's lobby. guests will be able to use the statio
REY [17]

The most important security consideration for the station is code signing. With code signing, consumers may feel confident about the software they are downloading and can stop worrying about infecting their computer.

With code signing, consumers may feel confident about the software they are downloading and can stop worrying about infecting their computer or mobile device with malware. Code signing has grown in importance for software developers and distributors as more software may be downloaded from the Internet.

Malware can be easily installed on a victim's computer by an attacker who poses as a trustworthy source. As long as users only download software that is regarded as safe by their operating system, code signing ensures that these types of assaults cannot happen.

Nowadays, the Operating System looks for the digital certificate produced through code signing when software is downloaded onto a computer to ensure the security of the software being installed. The user is informed and given the option to stop or continue the installation if no digital certificate is detected.

To know more about code signing click here:

brainly.com/question/28860592

#SPJ4

3 0
8 months ago
You give an object a more meaningful name by setting the object’s _________________ property.
viva [34]

Answer:

The correct answer to this question is "Name".

Explanation:

In the programming language, the object is a part of the object-oriented programming language (oops).In all (oops) programming language we use class and object. where class is a collection of data member and member function, and object is a real-world entity. An Object is an instance of a Class. When a class is created, no memory is assigned but when we create the object of the class then memory is allocated.

In this question except option (d), all options are wrong.

7 0
2 years ago
Select the correct answer.
Andrei [34K]

Answer: The answer is C

Explanation: When it comes to research papers your topic shouldnt be too broad. Your topic should be broad enough you can find a good amount of information but not too focused that you can't find any information.

7 0
2 years ago
Other questions:
  • Kurt is editing a table in his powerpoint that displays accounting formulas and when to use them. he wants to remove the table s
    15·1 answer
  • Which of the following is important to do when downloading a game to your
    8·1 answer
  • How to play music out of your apple watch?
    6·1 answer
  • What contains the computer brain the central processing unit
    8·2 answers
  • T FROW PYCW GCYN TA T ODYHP WQROW TW<br><br> Someone decode pls
    14·1 answer
  • What is modularity? Help asap
    9·1 answer
  • Which role will grant a delegate read-only access to a particular workspace within a user’s Outlook mailbox?
    15·2 answers
  • A network device that is used to connect multiple devices together without segmenting a network is a __________.
    10·1 answer
  • What is the purpose of quick access toolbar?
    7·1 answer
  • Retype the below code. Fix the indentation as necessary to make the program work.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!