1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svetoff [14.1K]
2 years ago
12

Hiiiiiiiiihwdawdfgthnythgrfergthyjuhgfd

Computers and Technology
2 answers:
irga5000 [103]2 years ago
5 0
No i will not marry u
Lilit [14]2 years ago
3 0

Answer:

Your answer would be gas.

Explanation:

Steam is just water just evaporated.

You might be interested in
When you use the mvc pattern for a java web application, you often add ________________________ to the request object before you
aivan3 [116]
Hi,

JVM - Java Virtual Machine

Hope this helps.
r3t40
6 0
3 years ago
Considering the following algorithm, which of the following requirements are satisfied?
Alisiya [41]

Answer:

b) Bounded Waiting

Explanation:

int currentThread = 1;

bool thread1Access = true;

bool thread2Access = true;

thread1 { thread2 {

While (true) {

                   While (true)

                                   {

                     while(thread2Access == true)

                                       {

                                      while(thread1Access == true)

                                       {

                                            If (currentThread == 2) {

                                              If (currentThread == 1)

                                                {        

                                                  thread1Access = false; thread2Access = false;

                                                  While (currentThread == 2);

                                                 While (currentThread == 1);

                                                  thread1Access = true; thread2Access = true;

} }

/* start of critical section */ /* start of critical section */

currentThread = 2 currentThread = 1

… ...

/* end of critical section */ /* end of critical section */

thread1Access = false; thread2Access = false;

… ...

} }

} }

} }

It can be seen that in all the instances, both threads are programmed to share same resource at the same time, and hence this is the bounded waiting. For Mutual exclusion, two threads cannot share one resource at one time. They must share simultaneously. Also there should be no deadlock. For Progress each thread should have exclusive access to all the resources. Thus its definitely the not the Progress. And hence its Bounded waiting.

4 0
3 years ago
What process does a system use to officially permit access to a file or a program CIS 502 ?
ipn [44]

Answer:

Authorization                                

Explanation:

Authorization is a security process to determine access levels related to system resources such as files, services, computer programs, data and application features. This is the method of allowing or denying access to a resource which enables the user to get access to various services and resources depending on the user's identity.

Authorization is the process that checks if a user has the permission to get access to a particular file or perform a particular action, ensuring that user has successfully authenticated himself. It refers to defining access policy.

For example a system administrator determines for the system device, in multi-user computer systems, which users are granted access to system and its resources and privileges are granted.

4 0
3 years ago
Primary purpose of ms Excel​
aleksandr82 [10.1K]
MS Excel is a spreadsheet programme developed by Microsoft in 1985, with the sole purpose of helping businesses compile all their financial data, yearly credit, and yearly debit sheets. Fast forward to the future after 31 years, it is now the most commonly used program for creating graphs and pivot tables.
8 0
3 years ago
Answer is A, do not believe the D answer;What are additional details that can be viewed in an Outlook task? Check all that apply
sergiy2304 [10]

Answer:

A

C

D

E

F

Explanation:

got it right on edg

3 0
3 years ago
Read 2 more answers
Other questions:
  • The ____ operation is used to add an element onto the stack.
    15·1 answer
  • Which of the following is the best definition of a workplace policy?
    13·2 answers
  • Who was one of the founders of the location sharing site Foursquare​
    10·1 answer
  • What are some beginning keyboarding questions?
    10·2 answers
  • which telecommunications service allows internet and telephone service to work over the same phone line
    13·1 answer
  • Why coaxial cable is called coaxial cable?
    11·1 answer
  • Which of the following is a scam in which a perpetrator sends an official looking e-mail that attempts to obtain a user’s person
    7·2 answers
  • A word I know, six letters it contains, remove one letter and 12 remains, what is it?
    8·1 answer
  • Can include the 5-tuple information, which is the source and destination ip addresses, source and destination ports, protocols i
    9·1 answer
  • Help me please I’m failing
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!