1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Amanda [17]
3 years ago
11

What size segment will be allocated for a 39 KB request on a system using the Buddy system for kernel memory allocation?A) 42 KB

.B) 64 KB.C) 39 KB.D) None of the above.
Computers and Technology
1 answer:
Mariulka [41]3 years ago
5 0

Answer:

B

Explanation:

64kb

You might be interested in
If a user cut a section from a photograph where is the cut sections location
madreJ [45]

I would answer, but there isn't enough information to answer for. .

6 0
4 years ago
The need to upgrade which component would likely lead to replacing the computer?
Alex787 [66]

Answer:

CPU

Explanation:

The CPU is essentially the brain of a CAD system soooo

6 0
3 years ago
For all of you who listen to podcasts, when do you usually find time to do so?​
ss7ja [257]
Morning and afternoon commute times are obvious blocks of time that you can assume are used for listening to podcasts, but the answer will obviously vary widely based on individual habits and schedules.

Hope this helps
7 0
3 years ago
A pen testing method in which a tester with access to an application behind its firewall imitates an attack that could be caused
sweet [91]

Answer:

a. True

Explanation:

The statement that a pen testing method or penetration test in which a tester who has a means of entry to an application behind its firewall imitates an attack that could be caused by a malicious insider.

A penetration test, which is also refer to as a pen test, pentest or ethical hacking, is an approved simulated cyberattack done on a computer system, performed in order to evaluate the security of the system. The test is carried out to identify both weaknesses or vulnerabilities including the potential for unauthorized parties to penetrate to the system's features and data.

The main purpose of performing this test is to identify any vulnerability in a system's defenses which attackers may take advantage of.

6 0
3 years ago
Which of the following tells the computer hardware what to do? A Information B) Software Procedures D People
Varvara68 [4.7K]

Answer: A.

Explanation:

8 0
2 years ago
Read 2 more answers
Other questions:
  • You want to arrange 6 of your favorite CD's along a shelf. How many different ways can you arrange the CD's assuming that the or
    15·1 answer
  • Critical Infrastructure and Key Resources (CIKR) are potential terrorist targets. CIKR might include: Select one: 1. All telecom
    14·1 answer
  • On Sarah’s first day at work she is provided with a range of information technology that she can use to write , edit or create d
    5·2 answers
  • -What is/are the goal/s of Business Intelligence systems?
    12·1 answer
  • How many wins does ninja have :/
    9·1 answer
  • What is the advantage of defining a target user?
    6·1 answer
  • The width of a strand of fiber is 19.2 micrometers. if 1500 strands are adhered side by side, how wide would the resulting fabri
    9·1 answer
  • When determining the statement of purpose for a database design, what is the most important question to ask?
    13·2 answers
  • The base on which the number n=(34)? is written if it has a value of n= (22)10​
    6·1 answer
  • Effectiveness of thicker,biodegradable plastic shopping bags
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!