1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
UNO [17]
4 years ago
15

Suppose that a CPU scheduling algorithm favors those processes that have used the least processor time in the recent past. Why w

ill this algorithm favor I/O-bound programs and yet not permanently starve CPU-bound programs?
Computers and Technology
1 answer:
avanturin [10]4 years ago
6 0

Answer:

I/O bound programs will be favored due to the CPU burst request of the I/O programs. This is because their CPU burst request is short and would release the CPU within a short period.

Due to the brief request time of the I/O programs on the CPU, CPU-bound programs will not be permanently starved. After a little while, CPU resources will be released to the CPU-bound programs for use.

You might be interested in
Explain the rationale of using hexadecimal notation by computer programmers
zhuklara [117]

Answer:

Hexadecimal numerals are widely used by computer system designers and programmers, as they provide a human-friendly representation of binary-coded values. Each hexadecimal digit represents four binary digits, also known as a nibble, which is half a byte.

Explanation:

4 0
4 years ago
According to the information presented in this​ video, a spreadsheet is effective for managing information about one thing​ (e.g
Nat2105 [25]

Answer:

According to the information presented in this​ video, a spreadsheet is effective for managing information about one thing​ (e.g., items for​ sale), but a

C. database

is better for managing information about more than one thing​ (e.g., items for sale and suppliers of​ items).

Explanation:

  • The option A is not correct as the flowchart is a step-by-step explanation of a procedure. It is visual presentation in which we explain a whole process.
  • The  option B is not correct as network is defined as the group of different computers, servers and other machines that helps the exchange of data.
  • The option c is correct as database is the means of storage of data as well as we can access this data at any time and it let you manage the data as well so we can manage a lot of information about multiple things at a time.
  • The option d is also incorrect as workflow is the visual presentation of sequence in which tasks are performed so it doesn't have to do anything wit the managing the information.
  • The option e is also incorrect as data model defines the properties of data of different things and it is used in database. It sets the rule of storing, managing and accessing the data in a database.
7 0
3 years ago
Describe the certifications developed by SANS. How are they different from InfoSec certifications like CISSP and SSCP?
Nat2105 [25]

Answer:

The certification developed by the SANS is GIAC certification .In this there are 3 certification GSEC,GISF and GCED .The description of these certification is given below .

Explanation:

The GIAC certification course is providing the knowledge of the security like cryptography ,networkig knowledge etc .

GSEC:The GSEC Certification is the certification of the security.It simply means this certification certified about the security risk in the computer system .

GISF: This certification gives the knowledge of the networking as well as the security in the computer system also it gives the knowledge of the cryptography.

GCED :This certification is also providing the knowledge of security as well as networking.

Difference between GIAC and  InfoSec certifications is given below

  • The SANS certification is giving the knowledge about the security risk as well as cryptography by the professional where as the InfoSec certifications providing the knowledge of the hacking by the professional .
  • The SANS is including the certification of  GIAC certification where as the InfoSec certifications is including the  CISSP and SSCP certification .
4 0
3 years ago
"The effectiveness of memory retrieval is directly related to the similarity of cues present when the memory was encoded to the
alexdok [17]

Answer:

D

Explanation:

Cause You Have To Decode It To Get To The Memory In The First Place

3 0
3 years ago
Which is the best budget motherboard for i3 8100
Nataly [62]
I3 8100 is e best budget
7 0
3 years ago
Other questions:
  • "Simon Says" is a memory game where "Simon" outputs a sequence of 10 characters (R, G, B, Y) and the user must repeat the sequen
    5·1 answer
  • Which of the following statements is false? Speaking to your computer is a form of input. Playing a video is an example of outpu
    10·1 answer
  • What type of storage system is a hard drive on a computer?<br> Need HELP fast, please.
    9·2 answers
  • Write code that causes a "triangle" of asterisks of size n to be output to the screen. specifically, n lines should be printed o
    10·1 answer
  • Research different ways that 3D printing is used in society. Tell us about the items that are 3D printed.
    15·2 answers
  • Write an application to pre-sell a limited number of theatre tickets. Each buyer can buy as many as 6 tickets. No more than 178
    5·1 answer
  • Study the sentence below
    13·2 answers
  • How was the addition of an improvement over early web design?
    11·1 answer
  • Can anyone tell me about Microsoft some important features for partical
    11·1 answer
  • When you type information into a document property field on the cover page, Word does not automatically add this information to
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!