1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
harina [27]
3 years ago
10

In terms of CPU scheduling metrics, __________ is the time at which the job completes minus the time at which the job arrived in

the system.
a. fairness index
b. turnaround time
c. throughput
d. response time
Computers and Technology
1 answer:
Evgesh-ka [11]3 years ago
7 0

Answer:

b. turnaround time

Explanation:

A scheduling computer system refers to the ability of the computer that typically allows one process to use the central processing unit (CPU) while another process is waiting for input-output (I/O), thus making a complete usage of any lost central processing unit (CPU) cycles in order to prevent redundancy.

In terms of CPU scheduling metrics, turnaround time is the time at which the job completes minus the time at which the job arrived in the system. It is one of the scheduling metrics to select for optimum performance.

You might be interested in
failed logins or instances of denial of access to restricted files may be indicators of compromise. suggest where records of suc
algol [13]

As forensic evidence of suspected intrusions on a host system or network, indicators of compromise (IOCs) are used.

<h3>What is indicators?</h3>

System administrators and information security (InfoSec) experts can identify malicious activity such as intrusion attempts using these artifacts. IOCs are used by security researchers to more thoroughly examine the methods and behaviour of a certain malware.

IOCs also offer useful threat intelligence that can be disseminated around the community to help organizations develop their incident response and remediation plans.

Some of these artifacts can be seen on the system's event logs, time-stamped entries, apps, and services. Various tools that monitor IOCs are also used by infosec experts and IT/system administrators to help mitigate, if not stop, breaches or assaults.

Therefore, As forensic evidence of suspected intrusions on a host system or network, indicators of compromise (IOCs) are used.

To learn more about indicators, refer to the link:

brainly.com/question/28093573

#SPJ1

4 0
1 year ago
A(n) _____ access file is also known as a direct access file.
zloy xaker [14]
The answer to the question asked  above is <span>remote direct memory .

</span>A remote direct memory  access file is also known as a direct access file.

Hope my answer would be a great help for you.    If you have more questions feel free to ask here at Brainly.

5 0
3 years ago
Owen is writing a program that will lock his computer for one hour if the incorrect password is entered more than five times. Ha
kiruha [24]

Answer:

Your answer is <em>I think </em>A) A loop

Explanation:

In computer programming, a loop is a sequence of instruction s that is continually repeated until a certain condition is reached.

5 0
3 years ago
Hidden costs of computers into our schools
Gala2k [10]

Answer:

There are certainly many hidden costs, and you need to find them out. I am listing some. The GPU can cost a lot if you are using them for complex computing like in the case of Bitcoin. You need to pay heavy electricity bills as well. And if you want to install the webserver then as well, you need to keep your computer open all the time, and pay a good sum as an electricity bill. Many more hidden costs can be found. And one out of above is used in Schools, the webserver. Some more hidden costs can be Network cost, as the school is big, and you need to connect all through LAN, and at times we also need WAN set up. And these are another hidden cost. Various education licenses come for free, and smart classes cost as well. The video conferencing, VOIP, etc costs as well. Smart classes training by various computer training institute for teachers like one from adhesive.

Explanation:

Please check the answer section.

6 0
3 years ago
Kieran wants to search a database quickly for information on the last time a patient came to his medical facility. This informat
SpyIntel [72]
B I think is what it is
7 0
3 years ago
Read 2 more answers
Other questions:
  • HELP ME RIGHT NOW !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
    8·1 answer
  • The concept of plug and play" is demonstrated by which of the following
    15·1 answer
  • The _____ toolbar can be customized to the preferences of the user.
    7·1 answer
  • How does this app work?
    11·2 answers
  • General equation: y = (89 / 27) - z * x + a / (a % 2) (recall: a is an integer; the 89 and 27 constants in the equation should b
    14·1 answer
  • How does the binary numbering system differ from the hexadecimal numbering system?
    14·2 answers
  • Which statement is NOT CORRECT?
    11·1 answer
  • A(n) _____ is a request for the database management software to search the database for data that match criteria specified by th
    15·2 answers
  • bryce's computer is acting unusually sluggish today he calls you an it techniician to see if you can find out what is going on a
    14·1 answer
  • Multiple choice:
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!