1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
noname [10]
4 years ago
11

_____ is a function performed by control programs that manages computer resources, such as storage and memory.

Computers and Technology
1 answer:
Fudgin [204]4 years ago
5 0
Resource allocation is a function performed by control programs that manages computer resources, such as storage and memory. It is necessary for any application to be run on the system because the computer is required to allocate certain resources for it to be able to run once the user opens any program.


You might be interested in
Write Java program to allow the user to input the amount of deposit, yearly interest rate (percentage), and income tax(percentag
Vedmedyk [2.9K]

Answer:

import java.util.Scanner;

public class num12 {

   public static void main(String[] args) {

       Scanner scr = new Scanner(System.in);

       System.out.println("Enter a Deposit Amount");

       double amt = scr.nextDouble();

       System.out.println("Income tax in percentage");

       double incomeTaxRate = scr.nextDouble()/100;

       System.out.println("Yearly interest rate:");

       double rate = scr.nextDouble();

       double intRate = rate/100;

       double interest = (amt*intRate)-(amt*incomeTaxRate);

       System.out.println("The Interest on "+amt+" at "+rate+"% after one year is "+interest);

   }

}

Explanation:

Find the sample output attached

Java's Scanner class is used to prompt and receive values for deposit amount, income tax rate and interest rate

The yearly interest is calculate by interest = (amt*intRate)-(amt*incomeTaxRate);

3 0
4 years ago
Someone else can drive your car if _____.
SVETLANKA909090 [29]

Answer:

C. you have proof of insurance

Explanation:

Residency has nothing to do with permission to drive a car. For example, someone may have residency, but be with a license suspended. So they can't drive.

Usually, also the insurance covers the CAR and not the person. So the general rule is:

Someone else can drive your car if you have proof of insurance

6 0
4 years ago
Read 2 more answers
Need help on this it’s the last one I need
BaLLatris [955]
Design a ringtone like it says
8 0
3 years ago
For the bag class in Chapter 3 (using a fixed array and a typedef statement) what steps were necessary for changing from a bag o
stiks02 [169]

Answer:

B. Change the int to double in the typedef statement and recompile

Explanation:

A typedef declaration is used to assign names to database.

Syntax:

typedef data_type new_name;

For this case the initial deceleration was

typedef int bag;

To change it to double values we have to do following

typedef double bag;

Therefore, option B is correct change the int to double in the typedef statement and recompile.

8 0
3 years ago
A recent topic of interest in the industry is the Intrusion Prevention System (IPS). Many vendors have created enhancements to I
Ilia_Sergeevich [38]

Answer:

IDS stands for "Intrusion Detection System". IDS is a passive-monitoring system since the main function of the IDS is to monitor the traffic and alert/log any suspicious activity in the traffic (both inbound and outbound). It does nothing to prevent the suspicious traffic.

IPS stands for "Intrusion Prevention System". It has the functionality of IDS and also adds an additional feature of preventing the suspicious traffic from entering the network. This can be done by using rules. "Pass" rules to pass the traffic and "deny" rules to deny the traffic into the network.

Snort - Best opensource IPS. This can be used as IDS also. Refer to their website for the complete details.

Trap and Trace Systems - These systems capture the incoming electronic or other impulses. This systems help in identifying what specific numbers called a specific telephone etc. In today's complex workplace, usage of "Trap and Trace Systems" violates the privacy of the individuals/employees. Having said that, this is completely different from the IDS and IPS. The purpose of the IDS and IPS is to alert or prevent the suspicious traffic from entering the network.

5 0
3 years ago
Other questions:
  • Physical access, security bypass, and eavesdropping are examples of how access controls can be ________.
    15·1 answer
  • What does CMOS stand for?
    15·2 answers
  • If the motherboard is not getting power, it will not start the boot. ... A four-year old laptop will not boot and presents error
    13·1 answer
  • In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism b
    7·1 answer
  • Which of the following does NOT describe a node?
    10·2 answers
  • Create a script that creates a new local variable.<br>• Name: BETTY<br>Value: Holberton<br>​
    6·1 answer
  • TRUE OR FALSE !!!!
    7·2 answers
  • Given the SQL statement:
    12·1 answer
  • Which insert image option allows a user to insert images from the internet?
    5·2 answers
  • Question 3 of 25 In computer science, what is a developer? A. A person who organizes all the details of a project B. An individu
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!