1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KengaRu [80]
3 years ago
6

Pls help me im confused prob more on the way

Computers and Technology
1 answer:
s2008m [1.1K]3 years ago
4 0

Answer: forecast the project's timeline,  estimate the level of effort and amount of resources needed. During this phase

You might be interested in
Which algorithm makes the most efficient use ofmemory?
SashulF [63]

Answer:

Best-fit Algorithm

Explanation:

Best-fit: Allocating the smallest memory location that is greater than or equal to the size of process.

<u>Example</u>

Let these are the memory locations-210kb,310kb,260kb,610kb

                    and size of processes-160kb,450kb,250kb,300kb

For the first-fit,

We allocate 160 kb to the 210kb memory location

Then, we allocate 450 kb to the 610kb because others don't have the size.

Then,we allocate 250kb to the 310 kb.

300 kb will stop,as no memory locations can execute.

For the Best-fit,

We allocate 160 kb to the 210kb memory location

Then,we allocate 450kb to the 610kb.

Then,we allocate 250kb to the  260kb not 310kb according to best-fit.

Then we allocate 300kb to the 310kb.

For the worst fit,

We allocate 160 kb to the 610kb memory location according to the worst-fit algorithm.

Then,we can't allocate 450kb to any memory location.

Then,we allocate 250kb to the 310kb .

We can' allocate 300kb in 260kb memory location.

As we can see from this example that in First-fit algorithm 300kb process will stop as no memory location is there.

In worst-fit algorithm ,We can't allocate 450kb,300kb to any memory locations.

In Best-fit algorithm,we can allocate the process to each location,so this algorithm is using memory in a efficient way.    

5 0
3 years ago
Which symbol would be used in a flowchart to represent a connection to another part of the flowchart
Lisa [10]
The answer is an arrow
3 0
3 years ago
What operating system are you using? On most computers, you can answer this question by right-clicking on the "My Computer" icon
Viktor [21]

Explanation:

hbbbbhygjjjjkllkkjhkkky

5 0
3 years ago
Read 2 more answers
A=3<br> b = 2<br> print (a ** b)<br> What is output?
Lady bird [3.3K]

Answer: ( 3**2)

Explanation: honestly I can't help you. Try google it is waiting for you with open harms.  

6 0
3 years ago
Read 2 more answers
In a __________, you are trying to find what others have prepared. With __________, you are trying to discover new patterns that
AveGali [126]

Answer:

<u>query,</u> <u>data mining </u>

Explanation:

A query can be explained as another term for question.

If one needs additional information from some other person, he might have ask to him. Queries are used for the retrieval of the information.

In other words, one tries to find what have been prepared by others.

Data mining can be explained as the process that allows to sort through a large set of data for the identification of patterns.

In this process of data mining, one tries to find out the new patterns that may not be known at all.

3 0
3 years ago
Other questions:
  • To create a button that will allow a user to send the form data to the server you use a type of ____
    5·1 answer
  • Does time complexity depend on, which base arithmetic you use? like base 10, 2 or whatever else? Does time coplexity depned on t
    13·1 answer
  • What does it mean to have liability for a company?
    6·1 answer
  • ____ are programs that run independently and travel between computers and across networks.
    7·1 answer
  • What safety feature melts to protect a circuit? a. fuse b. diode c. three-prong plug d. transistor
    10·2 answers
  • Phishing is ____________. When hackers overwhelm a website with too many requests. A network of private computers infected with
    7·1 answer
  • Complete the steps for adding a recurring event.
    10·1 answer
  • Justine was interested in learning how to play the piano. She has successfully passed every level of music book and is planning
    10·1 answer
  • Write a 2 paragraph on an African American who has become successful in IT. Need help asap can’t think of anything
    5·1 answer
  • Many programmers think object-oriented programming is a superior approach to procedural programming. Others think it adds a leve
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!