1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleksandr-060686 [28]
3 years ago
11

What happens if the addressed device does not respond due to a malfunction during a read operation?

Computers and Technology
1 answer:
m_a_m_a [10]3 years ago
4 0
If the read operation is implemented synchronously (this is the classic case), it will block and eventually time-out. The calling program should deal with the returned error.

If the read operation is asynchronous (as it will be in modern programming languages), the underlying library might provide an error callback, or you'll have to schedule a timeout task yourself.
You might be interested in
In a swap you need a variable so that one of the values is not lost ? Need help
emmasim [6.3K]

Answer:

In a swap, the variable is cuttly.x

Explanation:

7 0
3 years ago
Read 2 more answers
When can screen tips be useful
Vikki [24]
Whenever honestly , what subject is this for?
6 0
4 years ago
Read 2 more answers
Lian's dad uses an interactive machine that allows him
klemol [59]

Answer:

introduction to robotics

Explanation:

just took the test

4 0
3 years ago
Read 2 more answers
A new company will have 40 workstations in one building sharing a single network. All users must be able to share ¬les and print
kobusy [5.1K]

Answer:

Domain Networking.

Explanation:

A domain in networking refers to any group of workstation,users,printers devices ,database servers and computers which share different type of data via resources of network.

Hence domain networking will be the best option for the company having 40 workstation in a single building sharing a single network.

6 0
3 years ago
What term describes a set of software tools designed to increase the privileges of a user or to grant access to the user to port
san4es73 [151]

Answer:

A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.The term rootkit is a concatenation of "root" (the traditional name of the privileged account on Unix-like operating systems) and the word "kit" (which refers to the software components that implement the tool).

4 0
4 years ago
Other questions:
  • A database on a mobile device containing bands, sub-bands and service provider IDs allowing the device to establish connection w
    9·1 answer
  • Zack wants to be a landscape designer.which qualification would be best prepare him for work in this career
    12·2 answers
  • How much does a tech person get each year?
    11·2 answers
  • write a function that given an integer Y and 3 non-empty string A,B,W, denotingthe year of vacations, the beginning month, the e
    5·1 answer
  • Which cable would you check if you can't access any web pages?
    12·1 answer
  • Ria and her team ....................... they will win. *
    8·1 answer
  • What are some other ways to program a robot to navigate a complicated environment other than straight paths and right angle (90
    8·2 answers
  • For each of the innovations below. Decide if it is a computing innovation or not. Part 3 Continued.
    7·1 answer
  • Plz show working for binary addition. please solve. 11000 + 110101 + 101011​​
    15·2 answers
  • A designer wraps up a final prototype of a language learning app in Adobe XD, and wants to share their work with the development
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!