1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lesantik [10]
3 years ago
5

What do you understand by multitasking?Explain cooperativemultitasking ?

Computers and Technology
2 answers:
Nadusha1986 [10]3 years ago
4 0

Answer: Multitasking is the ability of the operating system by which a processor is able to process multiple task at the same time.

Cooperative multitasking is non preemptive multitasking where the processor is assigned to a single process and does not preempt  until it completes its jobs or moves to a waiting state.

Explanation:

In Multitasking jobs are executed at a faster rate than as many jobs or tasks can be assigned to the processor at the same time.

In cooperative multitasking due to the non preemptive nature a single job could be assigned to the cpu at a time.  

ki77a [65]3 years ago
3 0

Answer:

     The term multitasking refers to the act of performing two (or more) tasks at the same time. In our present society this concept has a common place in the lives of the vast majority of people. Few jobs do not require, at some level, any form of multitasking. What's more, in a 100% connected society, the immediacy of interactions and access to information keeps our attention constantly shifting, and smartphones, added to social networks, are everyday tools that keep us constantly multitasking wherever we go. .

    An important use of coroutines is the provision of a multitasking environment where multiple "tasks" (threads) can execute concurrently, sharing processor usage. Unlike a thread-based environment, which is typically preemptive (ie, tasks involuntarily lose control of the processor at any time of their execution), a coroutine-based environment is basically cooperative, meaning that tasks voluntarily relinquish the processor control.

    The cooperative multitasking style has the advantage that breakpoints are well-defined because you know exactly when control moves from task to task. So there is not that big bottleneck that we saw with context switching, where all registers need to be saved, among others. A more elegant, efficient and green solution.

Explanation:

You might be interested in
Ian’s photography teacher asks him to take some photos of a few different species over the weekend. Which group of photos would
alina1380 [7]
I think it’s b or d..............
5 0
3 years ago
Which block cipher mode of operating requires that both the message sender and receiver access a counter that computes a new val
ankoles [38]

There is block cipher kind of mode of operation. The block cipher mode of operating requires that both the message sender and receiver  is exchanged is the (CTR) Counter.

<h3>What is the Counter (CTR)?</h3>

This is known to be a common block cipher mode of operation. It often needs that both the message sender and receiver to have a kind of access a counter, that helps to computes a new value whenever a ciphertext block is been exchanged.

The disadvantage of CTR is known to be the fact that it needs a synchronous counter necessary for both the sender and receiver.

Learn more about  block cipher mode from

brainly.com/question/9979590

7 0
2 years ago
What has prompted schools to add Internet activities in their academic integrity policies?
irakobra [83]
What encouraged schools to add internet activities in their academic integrity policies is the existence of new technological advancements. The answer would be option A. Now the technology has become more advanced and most of the activities are now easily controlled through computers, it is also the responsibility of the schools to teach these students on how to properly use them. Hope this helps.
6 0
3 years ago
Read 2 more answers
A = [2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 33 34 35 36 37 38 39 40]
vova2212 [387]

Answer:

C = a./b

Explanation:

In MATLAB, the following command:

C = A./B

Performs the element by elemet division of A and B. This comand is called Right-array division.

So, in your case, we could divide A by B element by element, only using fully-vectorised code (ie. no loops), with the following code:

a = [2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 33 34 35 36 37 38 39 40];b = [1 3 5 7 9 11 13 15 17 19 21 23 25 27 29 31 33 43 45 47 49 50 54 59 60];C = a./b;

C would be the element by element division of A and B, with no loops.

5 0
3 years ago
John Cleaver is the CEO of Tech World, which is a retail store that sells computers, monitors, cameras, televisions and many oth
ohaa [14]

Answer:

not introduce the product

Explanation:

Based on the information provided within the question it can be said that in this scenario the best thing for John to do would be to not introduce the product. This is mainly due to the fact that all of the Five Forces are strong therefore this would be an extremely highly risky business strategy that may lead to massive losses.

4 0
3 years ago
Other questions:
  • Animation and transition effects will distract your audience when using a slide show presentation aid. True or false ?
    10·2 answers
  • The "fathers of the internet" are vinton cerf and ________.
    9·1 answer
  • The TabIndex value assigned to a text box's identifying label must be _______________ for the text box's access key to work corr
    14·1 answer
  • Were Al Zink’s actions that of someone trying to be an invisible Sponsor
    14·1 answer
  • On laptops with a smart card reader installed, where is the smart card reader usually located?
    13·1 answer
  • The ____ is the period of time within which systems, applications, or functions must be recovered after an outage. Select one:
    14·1 answer
  • What was a result of george washington's belief in the sovereignty of the people instead of monarchy?
    9·1 answer
  • A cell reference in a formula allows you to point to another cell location
    8·2 answers
  • Which attack intercepts communications between a web browser and the underlying computer?
    10·1 answer
  • Write code using the range function to add up the series 99, 98, 97,...
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!