1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inessa05 [86]
3 years ago
9

Consider a swapping system in which memory consists of the following hole sizes in memory order: 10 MB, 4 MB, 20 MB, 18 MB, 7 MB

, 9 MB, 12 MB, and 15 MB. Which hole is taken for successive segment requests of (a) 12 MB (b) 10 MB (c) 9 MB for first fit
Computers and Technology
1 answer:
lyudmila [28]3 years ago
5 0

Answer:

a) 20 MB

b) 10 MB

c) 18 MB

Explanation:

First fit method works by keeping list of jobs which are ordered by memory location. This list of jobs contains free/busy status. Free means that hole is available and it takes the memory requests and busy is for the memory space is occupied.

In first fit method the first process takes the first available hole or memory with space greater than or equal to the size of the job. OS assigns process to nearest memory partition available with sufficient size.

For the request for 12 MB the hole with size 20 MB is taken as its nearest memory location of sufficient size than 10 and 4 MB. Now the status of this is busy as its taken by a job.

Next for the request of 10 MB the sufficient nearest memory hole is 10 MB as its equal to the size of the job. The status is changed to busy.

Next for the request of 9 MB the sufficient nearest hole is 18 MB as the 10 and 20 MB are already taken and 4 MB is not sufficient so the first sufficient available hole is of 18 MB.

You might be interested in
Identfy two duties of the governer stationed at mombasa under portugues rule?​
Tpy6a [65]

Answer:I got u

Explanation:

6 0
3 years ago
Which of the following is a basic principle of improvement?
lesya [120]

From the given the statement, "every system is perfectly designed to get the results it gets" is a basic principle of improvement.

Option B

<u>Explanation:</u>

The improvement activity begins with the quote ‘every system is perfectly designed to get the results it gets’, by W. Edwards Deming; The quote states both the unintended and intended effects are designed into our systems.

For example: Healthcare in the UK has been perfectly designed to lower the waiting times to 18 weeks for various procedures over last twelve years. Reflecting on Safer Patients Initiative (SPI), this can be true to improvement systems: every improvement system is perfectly designed to get the results its gets and SPI is a case in point.

The leading improvements that need to be designed into our improvement systems:

  • Improvement activity needs to be built on strong foundations
  • Greater engagement with people’s intrinsic motivation
  • Embrace a wider set of methods
  • Greater understanding of how systems and processes outside direct clinical care contribute to safety and quality.

So, it can be concluded that the line given by W. Edwards Deming tends to be the principle of improvement.

6 0
3 years ago
Part of implementing Ken 7 Windows Limited new enterprise resource planning (ERP) software is ensuring all workstations and serv
spayn [35]

Answer:

Explanation:

1) The Functions a software application provide to keep a web browser secured includes:

a) The web browser should always be updated, you can keep it on "automatic update" option enable on your browser settings so that it will be automatically updated whenever the browser gets an update.

b) Always keep the third party cookies disabled because of the many unauthorized and phishing sites over the internet. This leaves the browser unsafe and cause higher security risk so block all the third party sites and cookies from the browser.

2) The Functions a software application prohibit to keep a web browser secured includes:

a) Do not store passwords on your web browser, deny the "store password" option on your browser settings. This is very important Even if you store passwords on your web browser do set a very strong master password to access all the stored passwords.

b) Don't ever click on unwanted and unknown hyperlinks. There will be many unsolicited attachments, files, etc over the internet please do not open or download it unnecessarily.

3) The functions a software application should provide to keep a web server secured includes:

a) Always using an application scanner. Whenever you install or download any new applications, scan the application before accessing it or opening it.

b) Install all the security patches to keep off hackers as they are many on the internet.

4) The Functions a software application should prohibit to keep a web server secured includes:

1) Uninstall an application that has not been used for long time, because they are actually of no use.

b) There may be scripts, files, setups, codes stored on the web server unknowingly so do check it and delete all the sample scripts, files and codes from the web server.

3 0
3 years ago
2. Which of the following is not one of the guidelines for using instant messaging?A.You can use in place of all face-to-face co
Alexxandr [17]

Answer:

A. You can use in place of all face-to-face communication.

Explanation:

Hope this helps

6 0
3 years ago
5.   Which of the following attributes of a website indicates a more reliable source for information?
Leona [35]
The answer would be B because ".edu" stands for education and it shows there was a source for the information
5 0
3 years ago
Other questions:
  • OSHA requires that employers pay for most required personal protective equipment (PPE), including: A. Hard hats B. Logging boots
    5·1 answer
  • A word object in an excel worksheet to activate the word features
    9·1 answer
  • Some languages are traditional programming languages for developing applications; others, such as markup and scripting languages
    12·1 answer
  • Troy, an aspiring screenwriter, aspires to work with a famous director known for his philanthropic work. Troy gets an appointmen
    5·1 answer
  • Research the topic of legal and ethical behaviors or dilemmas related to technology. Identify five topics of concern and briefly
    9·1 answer
  • What is an avenue in a Karel world?
    6·2 answers
  • Which element is represented by the electron configuration in example B? Example B: 1s22s22p63s23p64s1 Aluminum Cesium Potassium
    12·2 answers
  • The address for the website you want to visit is called the browser internet URL World Wide Web
    5·2 answers
  • What is white light?
    12·2 answers
  • What Windows utility can enable you to shut down an unresponsive application?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!