1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
harina [27]
3 years ago
10

In terms of CPU scheduling metrics, __________ is the time at which the job completes minus the time at which the job arrived in

the system.
a. fairness index
b. turnaround time
c. throughput
d. response time
Computers and Technology
1 answer:
Evgesh-ka [11]3 years ago
7 0

Answer:

b. turnaround time

Explanation:

A scheduling computer system refers to the ability of the computer that typically allows one process to use the central processing unit (CPU) while another process is waiting for input-output (I/O), thus making a complete usage of any lost central processing unit (CPU) cycles in order to prevent redundancy.

In terms of CPU scheduling metrics, turnaround time is the time at which the job completes minus the time at which the job arrived in the system. It is one of the scheduling metrics to select for optimum performance.

You might be interested in
Electronic mail is a
skad [1K]

Answer:

A) Transmission of letter, message and memos over a communication network

Explanation:

Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties. One of the most widely used communication channel or medium is e-mail (electronic mail).

An e-mail is an acronym for electronic mail and it is a software application or program designed to let users send texts and multimedia messages over the internet.

Hence, electronic mail is a transmission of letter, message and memos over a communication network. Some examples of the commonly used electronic mails platform are Yahoo, G-mail, etc.

5 0
3 years ago
What methods do phishing and spoofing scammers use? List and explain methods to protect against phishing and spoofing scams.
Elza [17]

How can you protect against phishing and spoofing scams?

Anti-spyware and firewall settings should be used to prevent phishing attacks and users should update the programs regularly. Firewall protection prevents access to malicious files by blocking the attacks. Antivirus software scans every file which comes through the Internet to your computer.

6 0
3 years ago
How many frequencies does a full-duplex qam-64 modem use?
Vsevolod [243]

The answer is 2 frequencies.

A Full-Duplex QAM 64 K Modem uses two frequencies. One frequency is used for upstream and the other for downstream. A variety of common QAM forms are available and include, 16 QAM, 32 QAM, 64 QAM, and 256 QAM. For example, for domestic broadcast use, 64 and 256 QAM are used for cable modem and digital cable TV. The modulation scheme for this modem uses both amplitude and phase.

8 0
4 years ago
Read 2 more answers
if we had a set of 10 constraints and solver had to deterimine which 4 to enforce what would be the binary indicator varibales h
Inessa [10]

Answer:

if we had a set of 10 constraints and solver had to determine which 4 to enforce what would be the binary indicator variables have to  sum to make this happen

answer : 6

Explanation:

number of constraints = 10

solver has to determine which 4 to enforce

Hence the number the Binary indicator will have to sum to enforce 4

will be : (number of constraints) - 4

              = 10 - 4 = 6

5 0
3 years ago
How should tools be stored <br>​
sweet-ann [11.9K]
You should store tools in a storage or tool box
4 0
3 years ago
Other questions:
  • Which organization has published more than 300 web standards
    7·1 answer
  • Pls help........
    15·1 answer
  • Suppose you have the following declaration.int[] beta = new int[50];Which of the following is a valid element of beta.(i) beta[0
    14·1 answer
  • All states that have altered judicial selection techniques in recent years have adopted some form of:
    5·1 answer
  • What is a warm site? Multiple Choice a separate facility that does not have any computer equipment but is a place where employee
    5·1 answer
  • The property that allows a metal to be drawn into wires is called...
    9·1 answer
  • When does the following while-loop stop running?
    10·1 answer
  • Who wrote the book of luke​
    7·1 answer
  • Sean is frustrated with having to use separate editors, compilers, libraries, plug-ins, and debugers. What could Sean use to mak
    8·1 answer
  • An attacker obtains a connection to your LAN and then uses SETH to perform a MiTM attack between your system and the company RDP
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!