1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
slavikrds [6]
3 years ago
15

Please help me with these questions please

Computers and Technology
1 answer:
sp2606 [1]3 years ago
4 0

Answer: i think its 30.

You might be interested in
The page-replacement policy means that pages are not placed to make more space. A. True B. False
BabaBlast [244]

Answer:

B. False

Explanation:

A page-replacement policy can be defined as a set of algorithm that instructs the operating systems on what memory page is to be swapped, paged out or written to disk in order to allocate more memory as they're required by various active processes during virtual memory management.

Some of the algorithms or techniques used by the operating system for page-replacement policy are;

1. Last In First Out (LIFO).

2. First In First Out (FIFO).

3. Least Recently Used (LRU).

4. Least Frequently Used (LFU).

5. Optimal (OPT or MIN).

Hence, the page-replacement policy means that pages are placed to make more space and to minimize the total number of page that would be missing.

7 0
3 years ago
What job does a back-end developer perform?
Diano4ka-milaya [45]

Answer:

Handles what happens behind the scenes on websites

Explanation:

The website back end is made up of server, an application, and a database. The back-end developer builds and coordinate these components together. Back end developers manage the technical side of the websites (that is what the users do not see on the website).

The back end developer needs to know how to program using PHP, java, Python, Ruby, as well as use tools such as MySQL, Oracle, and SQL Server.

6 0
3 years ago
Ip ____ is the falsification of the source ip address in a packet's header so that it appears to have come from a trusted or leg
tensa zangetsu [6.8K]
<span>IP spoofing the falsification of the source ip address in a packet's header so that it appears to have come from a trusted or legitimate sender.</span>
5 0
3 years ago
15. Select the correct answer.
givi [52]

Answer:

Pixel dimensions

Explanation:

measure of height and width of a image in pixels

3 0
3 years ago
Programmers should strive to _____. increase coupling increase cohesion both of the above neither a nor b
denpristay [2]
The answer is increase cohesion.  <span>Programmers should strive to increase cohesion.  C</span>ohesion<span> points to the </span><span>degree to which the elements inside a module belong together.  </span><span>In a highly </span>cohesive<span> system, code readability and reusability is </span>increased<span>, while complexity is kept manageable.</span>
7 0
3 years ago
Other questions:
  • Suppose you wish to write a method that returns the sum of the elements in partially filled array. Which is the best choice for
    6·1 answer
  • WHAT DOES THE WORD MONOCHROME MEAN?
    11·1 answer
  • Validation ensures that a website looks good.<br> True or False
    9·1 answer
  • Which type of system requires a regular backup of files
    10·2 answers
  • In information security, a specification of a model to be followed during the design, selection, and initial and ongoing impleme
    5·1 answer
  • Is brainly bugging out rn? <br> The site isnt like loading completely
    5·1 answer
  • Which of the following are good backup methods you can use to protect important files and folders from loss in the case of a har
    15·2 answers
  • Take points for free who are new and enjoye them
    9·2 answers
  • Which three statements are true of lossless compression?
    6·1 answer
  • When companies charge different prices for the same product, they're using
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!