1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andre45 [30]
3 years ago
5

technician is dispatched to troubleshoot a user's computer. After performing diagnostics, the technician determines that drive t

hrashing is occurring. What are the factors that can affect this?
Computers and Technology
1 answer:
Paraphin [41]3 years ago
4 0

Answer:

Factors that can affect drive thrashing are;

The computer memory modules

Hard drives

Running processes

Paging file  

Explanation:

Drive thrashing also known as disk thrashing occurs due to over stressing the hard drives by moving data from the from virtual memory,(paging file) to system memory,(RAM) and back again such that the memory becomes exhausted resulting in slow performance or system halting.

Factors that can affect drive thrashing are the computer memory modules, hard drives, running processes, and paging file  

When thrashing occurs, the computer performance is slowed down or halts as the hard drives resources has reached close to capacity.

You might be interested in
In report design view, you can use commands on the align button of the _____ tab.​
gogolik [260]
I'd say the Arrange tab

Sizing and moving fields in design view can sometimes be time consuming. Be that as it may, we can always use the tab order dialog box to perform this operation. To do so, we select the labels and fields in question, proceed to the Arrange tab, sizing and ordering group and then click on the Align button.


5 0
3 years ago
Write a method for the Invitation class that accepts a parameter and uses it to update the address for the event.
DerKrebs [107]

Answer:

public class Invitation {

 private String hostname;

 private String address;

  public Invitation(String n, String a) {  // constructor that accepts two strings.

   hostname = n;

   address = a;

 }

  public String getHostname() {

   return hostname;

 }

 public void setAddress(String a) {

   address = a;

 }  

 public String invite(String guest) {

   return "Hello" +guest+ ", you are invited to my party at " +address+". "+hostname+".";

 }

 public Invitation(String host, String address) {

   this.address = address;

   this.hostname = host;

 }

}

Explanation:

The Java program defines a class called "Invitation". The class constructor has two string arguments or parameters for the host of the event and the address. The invite method is used to generate the string invite message with the name of the guest as the argument. Use the "setAddress" method to set a new location of the event and the "getHostname" to get the name of the event host.

6 0
3 years ago
Which of the following is a valid format symbol in Microsoft Excel? Dollar Sign, Comma, Percent Sign or all of them? I can't fig
Helen [10]
The Answer is all of them, it's okay when i had to take this class last year and it took me for ever to find the tab and paste options. 
6 0
3 years ago
Assume you're using a three-button mouse. To access shortcut menus, you would
irina1246 [14]
If you are using the three-button mouse, in order to access the shortcut menus, you would right click the mouse. 
If you right click your mouse, it will show shortcut menus that can be easily accessed.
5 0
3 years ago
SP 800-14, Generally Accepted Principles and Practices for Securing Information Technology Systems, provides best practices and
Alika [10]

Answer:

blueprint.

Explanation:

Generally Accepted Principles and Practices for Securing Information Technology Systems, provides best practices and security principles that can direct the security team in the development of a security blueprint.

3 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following should you avoid when designing your Print resume?
    11·1 answer
  • A _____ is a member function that is automatically called when a class object is created.
    13·1 answer
  • Which one of the following is not the name of a 20th century school composition
    14·2 answers
  • How can you tell that a website is valid and reliable
    7·2 answers
  • Which note-taking method quickly captures and organizes information?
    9·2 answers
  • Which of the following function headings arevalid? If they are invalid, explain why.
    12·1 answer
  • What does NOT match with Agile Manifesto?
    9·1 answer
  • Wyatt has a database to keep track of his enormous collection of videos. How can Wyatt find the details for the game Lost on Mar
    11·2 answers
  • How does Shakespeare immediately introduce Tybalt as a menacing character?
    9·1 answer
  • Can somebody PLEASE help me cancel my subscription I have tried so many different things and contacted support - they are no hel
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!