1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aniked [119]
4 years ago
10

Consider a text editor that saves a file whenever you click a save button. Suppose that when you press the button, the editor sim

ply (1) animates the button "down" event (e.g., by coloring the button grey), (2) uses the write() system call to write your text to your file, and then (3) animates the button "up" event (e.g., by coloring the button white). What bad thing could happen if a user edits a file, saves it, and then turns off her machine by flipping the power switch (rather than shutting the machine down cleanly)
Computers and Technology
1 answer:
Monica [59]4 years ago
6 0

Answer:

The answer to this question can be defined as follows:

Explanation:

  • The write() method guarantees you to updates the memory of both the kernel, and may not ensure which updates were flushed through stable storage.
  • Unless the client instead switches on either the monitor but views the file, it displays the file, to combines from older and newer versions will be shown.
  • The very first two cases will be deemed "bad" because the user probably can not expect them after completing the save.
You might be interested in
Question2.<br> What are the functions of information technology?
vovangra [49]

Answer:

I) infrastructure

ii) communication

iii) introduces and maintains computerized systems to process data efficiency , etc

3 0
2 years ago
How do you create a IOS app?
Ivahew [28]
I would use x code and watch tutorials on how to code on youtube
5 0
4 years ago
What are technology trends in science check all that apply
Doss [256]

Answer:

3D Printing Molecules.

Adaptive Assurance of Autonomous Systems.

Neuromorphic Computing (new types of hardware) and Biomimetic AI.

Limits of Quantum Computing: Decoherence and use of Machine Learning.

Ethically Trustworthy AI & Anonymous Analytics.

Explanation:

6 0
3 years ago
This activity involves the final processing and complete sterilization of the process finish product
antoniya [11.8K]

Answer:

which activity is that am just asking

3 0
3 years ago
Create an algorithm that will convert dog years to human years using the assumption that 1 dog year = 7 human years. Prompt the
matrenka [14]

Answer:

Algorithm:

1. Declare and initialize variable one_dog_year=7.

2.Ask user to give dog age.

   2.1 Read the dog age and assign it to variable "dog_age".

3.Create a variable "human_age" to store the equivalent human age.

   3.1 Calculate equivalent human age as "human_age=one_dog_year*dog_age".

4.Print the equivalent human age of dog age.

7. End the program.

// here is algorithm implemented in c++

#include <bits/stdc++.h>

using namespace std;

int main()

{

   // initialize one dog year

   int one_dog_year=7;

   int dog_age;

   int equi_h_age;

   cout<<"Enter the dog age:";

   // read the dog age

   cin>>dog_age;

   

   //calculate the equivalent human age

   equi_h_age=dog_age*one_dog_year;

   cout<<"equivalent human age is : "<<equi_h_age<<endl;

return 0;

}

Output:

Enter the dog age:2                                                                                                                                            

equivalent human age is : 14

4 0
3 years ago
Other questions:
  • Which function of a web page relies on responsive web design
    14·1 answer
  • is family mobile and boost mobile the same? if not whats the difference? (btw this is a random question)
    12·2 answers
  • What is the first thing you should do before constructing a window in the IDE?
    14·1 answer
  • Which of the following is similar to defense in depth and supports multiple layers of security?a. Defense in depthb. Diversity o
    7·1 answer
  • You can run a macro by:
    10·1 answer
  • What is an infodemic?
    10·1 answer
  • The encapsulating security ______ protocol provides secrecy for the contents of network communications as well as system-to-syst
    14·1 answer
  • 1 #include 2 3 int max2(int x, int y) { 4 int result = y; 5 if (x &gt; y) { 6 result = x; 7 } 8 return result; 9 } 10 11 int max
    12·1 answer
  • window operating system popularly known as. 1) character user interface. 2) computer user interface. 3) graphic user interface.
    15·1 answer
  • Name any five application or uses of smartphone and computer.<br>​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!