1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leokris [45]
3 years ago
6

Select one or more of the following: Which of these events will cause signal(s) to be generated by the kernel (the operating sys

tem itself) and sent to your childless foreground process?
a. The process has done something wrong (segmentation fault, etc.)
b. A timer has expired, which sends the signal SIGALRM
c. The process has exited normally
Computers and Technology
1 answer:
nikitadnepr [17]3 years ago
7 0

Answer:

a. The process has done something wrong (segmentation fault, etc.)

Explanation:

Events that cause signals to be generated by kernel and sent to childless foreground process is the process has done something wrong(segmentation fault), as Hardware exceptions generate signals,for example, divide by 0 or invalid memory reference. These conditions are usually detected by the hardware, and the kernel is notified. The kernel then generates the appropriate signal for the process that was running at the time the condition occurred.

You might be interested in
User can use ______ commands to search for and correct words in a document
Maksim231197 [3]
Find and replace is the answer
5 0
3 years ago
Information systems security is the collection of activities that protect the information system and the data stored in it.
ivann1987 [24]

Answer:

The answer is A. True.

Explanation:

Information systems security,refers to all the methods involved with assuring information integrity as well as keeping it confidential, and available.

It can also be defined as -

The detection and provisoon of solutions to security breaches.

Access controls, which prevents unauthorized system access.

Protection of information either in transit or in a storage area.

3 0
3 years ago
What are the nine tasks (steps) you should perform prior to upgrading a computer to windows 7?
BARSIC [14]
I think those 9 tasks would be :

1. learns windows powershell
2. Plow through licensing
3. focus on strategic improvements
4. Expand the deployment scope
5. Prepare for distributed security
6. Virtualize your destkop
7. Evaluate enterprise features
8. Build compatibility safety nets
9. Remove your users' local admin rights
4 0
4 years ago
The ____________ is a wildcard character that is used to search for an unknown single character.
mafiozo [28]
Asteristik or as we see as (*)
5 0
3 years ago
Which type of malware self-replicates between computers (from one computer to another)?
kramer
A "worm" is a self-replicating malware.
6 0
4 years ago
Other questions:
  • The set of Visual Basic instructions that tells an object how to behave after an action by the user (such as clicking a button)
    6·1 answer
  • What does a first line indent look like
    13·1 answer
  • Figuring out why your computer won't turn on falls under diagnosing.<br> A. True<br> B. False
    15·2 answers
  • Where does the VLookup function find its lookup values?
    14·1 answer
  • Someone please help me with the right answer please
    13·1 answer
  • What would be a standard way for anyone outside an agile team( for example, delivery partner partner of the account, head of the
    14·1 answer
  • What is a type of machine-to-human communication?
    14·1 answer
  • Which category does this fall in identity theft​
    6·1 answer
  • Drag the tiles to the correct boxes to complete the pairs.
    15·2 answers
  • Using AI to filter potential job applicants might be considered _____
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!