1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Reil [10]
3 years ago
11

(Giving brainliest to best answer, don't make an answer if you don't know or its jumble)

Computers and Technology
2 answers:
dolphi86 [110]3 years ago
7 0

Answer:

B

Explanation:

Trava [24]3 years ago
5 0

Answer:

C

Explanation:

I just got it right on an Edge Quiz

You might be interested in
A computer emergency response team is called at midnight to investigate a case in which a mail server was restarted. After an in
ANEK [815]

<u>Answer</u>:   B. Identify the source of the active connection

<em>Any problem can be fixed only finding of the source of it. We can fix a problem in ‘n’ number of ways but it might again come back if source of it is not identified.</em>

<u>Explanation:</u>

Identify the source of the active connection is the NEXT step the team should take. It is very similar to our human body.

If the infection is coming in the body again and again and gets fixed in the treatment, the reason for come - back will be identified so that it does not <em>lead to unnecessary treatment. </em>

In a similar way, if source are identified then the problem of come-back can be avoided. <em>So option B would be the right choice.</em>

4 0
3 years ago
Add me on fornite buddies Lynn_.25
Anna007 [38]

i- why would u ask that

Explanation:

6 0
2 years ago
Read 2 more answers
A VALENTINE
-Dominant- [34]

Answer:

i dont see the image

Explanation:

6 0
3 years ago
Read 2 more answers
here are pros and cons for doing temp work. Please select the best answer from the choices provided T F
Brut [27]

Answer:

Hello! the answer should be true, I hope i got here in time.  

Explanation:

6 0
3 years ago
Read 2 more answers
Illustrate that the system is in a safe state by demonstrating an order in which the threads may complete.If a request from thre
Kamila [148]

Answer:

a. safe sequence is T2 , T3, T0, T1, T4.

b. As request(T4) = Available, so the request can be granted immediately

c. As request(T2) < Available, so the request can be granted immediately

d. As request(T3) < Available, so the request can be granted immediately.

Explanation:

It will require matrix

[i, j] = Max [i, j] – Allocation [i, j]

A B C D

T0 3 3 3 2

T1 2 1 3 0

T2 0 1 2 0

T3 2 2 2 2

T4 3 4 5 4

Available = (2 2 2 4)

1. Need(T2) < Available so, T2 can take all resources

Available = (2 2 2 4) + (2 4 1 3) (Allocation of T2) = (4 6 3 7)

2. Need(T3)<Available so, T3 will go next

Available = (4 6 3 7) + (4 1 1 0) = (8 7 4 7)

Like wise next T0, T1, T4 will get resources.

So safe sequence is T2 , T3, T0, T1, T4.

(Note, there may be more than one safe sequence).

Solution b.

Request from T4 is (2 2 2 4) and Available is (2 2 2 4)

As request(T4) = Available, so the request can be granted immediately.

Solution c.

Request from T2 is (0 1 1 0) and Available is (2 2 2 4)

As request(T2) < Available, so the request can be granted immediately.

Solution d.

Request from T3 is (2 2 1 2) and Available is (2 2 2 4)

As request(T3) < Available, so the request can be granted immediately.

5 0
3 years ago
Other questions:
  • business owners and managers may first balk at the idea of mobile officer workers because there may appear to be a lack of ___ w
    9·1 answer
  • Tamara has $500 she is looking to save for a class trip. She wants to earn the most possible interest and will not need access t
    7·1 answer
  • In 1-2 sentences, describe some keyboard shortcuts you have used during this lesson to save you time.
    13·2 answers
  • Write a program called DeliveryCharges for the package delivery service in Exercise 4. The program should again use an array tha
    9·1 answer
  • I’ll mark brainliest if correct
    10·1 answer
  • Complete the sentence.<br> The IP protocol creates and addresses packets at the _____ layer.
    7·2 answers
  • BRAINLIEST BRAINLIEST BRAINLIEST BRAINLIEST BRAINLIEST BRAINLIEST BRAINLIEST BRAINLIEST BRAINLIEST BRAINLIEST BRAINLIEST BRAINLI
    6·2 answers
  • in Python we use IDE ( lntegrated Dvelopment Environment ) to write down the program data points of difference between script mo
    13·1 answer
  • Im lonellly whos down to date me
    7·2 answers
  • Does anyone know what episode Hinata threatens useless sakura?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!