Consider the dynamic partition allocation method. Assume at some time, there are five free memory partitions of 100KB, 500KB, 200KB, 300KB, AND 600KB(in order), how would the first-fit algorithms place processes of 212KB, 417KB, 112KB, and 426KB(in order)

Answers

Answer 1

Answer:

212KB is allocated to 500KB partition

417KB is allocated to 600KB partition

112KB is allocated to 288KB partition

426KB will wait

Explanation:

The first fit algorithm works by taking up the first available free partition which has a large enough enough space to accommodate it's size ; The 212KB takes up 500KB (it's the next available partition larger Than 212) ; then it leaves a space of (500KB - 212KB = 288KB) ; Then the 417KB takes up the next large enough storage space of 600KB (also leaving 600 - 417 = 183KB) ; the next large enough space for 112KB is the 288KB ; there is no space large enough to accommodate 426KB.


Related Questions

write a program to enter 30 integer numbers into an array and display​

Answers

Answer:

i764

Explanation:

Answer:

Explanation:

Python:

numberlist = []

for i in range(0, 29):

   a = input("Enter a number: ")

   numberlist[i] = a

print(*meh, sep = "\n")

4. Write a program to calculate square root and
cube root of an entered number .​

Answers

Answer:

DECLARE SUB SQUARE (N)

CLS

INPUT “ENTER ANY NUMBER”; N

CALL SQUARE(N)

END

SUB SQUARE (N)

S = N ^ 2

PRINT “SQUARE OF NUMBER “; S

END SUB

Linda wants to change the color of the SmartArt that she has used in her spreadsheet. To do so, she clicks on the shape in the SmartArt graphic. She then clicks on the arrow next to Shape Fill under Drawing Tools, on the Format tab, in the Shape Styles group. Linda then selects an option from the menu that appears, and under the Colors Dialog box and Standard, she chooses the color she wants the SmartArt to be and clicks OK. What can the option that she selected from the menu under Shape Fill be

Answers

Answer: Theme colors

Explanation:

Based on the directions, Linda most probably went to the "Theme colors" option as shown in the attachment below. Theme colors enables one to change the color of their smart shape.

It is located in the "Format tab" which is under "Drawing tools" in the more recent Excel versions. Under the format tab it is located in the Shape Styles group as shown below.

Write a recursive function that has an argument that is an array of characters and two arguments that are bounds on array indexes. The function should reverse the order of those entries in the array whose indexes are between the two bounds. For example, if the array is a[0]

Answers

Answer:

The function is as follows:

void revArray(char arr[], unsigned int low, unsigned int high)  {  

      if (low >= high){

        return;  }

  swap(arr[low], arr[high]);  

  revArray(arr, low + 1, high - 1);  }

Explanation:

This declares the function. It receives a char array and the lower and upper bounds to be reversed

void revArray(char arr[], unsigned int low, unsigned int high)  {  

This is the base case of the recursion (lower bound greater than or equal to the upper bound).

      if (low >= high){

        return;  }

This swaps alternate array elements

  swap(arr[low], arr[high]);  

This calls the function for another swap operation

  revArray(arr, low + 1, high - 1);  }

Select the correct answer.
What is the advantage of using transparencies?
O A. They support better image quality than online presentations.
O B. They are helpful when creating non-linear presentations.
OC. They allow the presenter to jot down points on the slide.
OD. They are better suited to creating handouts.
Reset
Next

Answers

Answer:

They are better suited to creating handouts

Write a method called lexLargest that takes a string object argument containing some text. Your method should return the lexicographical largest word in the String object (that is, the one that would appear latest in the dictionary).

Answers

Answer:

public static String lexLargest(String text){

       //split the text based on whitespace into individual strings

       //store in an array called words

       String[] words = text.split("\\s");

       

       //create and initialize a temporary variable

       int temp = 0;

       

       //loop through the words array and start comparing

       for(int i = 0; i < words.length; i++){

           

           //By ignoring case,

           //check if a word at the given index i,

           //is lexicographically greater than the one specified by

           //the temp variable.

          if(words[i].compareToIgnoreCase(words[temp]) > 0){

               

               //if it is, change the value of the temp variable to the index i

              temp = i;

           }    

       }

       

       //return the word given by the index specified in the temp

               // variable

       return words[temp];

    }

Sample Output:

If the text is "This is my name again", output will be This

If the text is "My test", output will be test

Explanation:

The code above has been written in Java. It contains comments explaining the code. Sample outputs have also been given.

However, it is worth to note the method that does the actual computation for the lexicographical arrangement. The method is compareToIgnoreCase().

This method, ignoring their cases, compares two strings.

It returns 0 if the first string and the second string are equal.

It returns a positive number if the first string is greater than the second string.

It returns a negative number if the first string is less than the second string.

Question #4
Math Formula
What will you see on the next line?
>>>int(3.9)

Answers

Answer:

3

Explanation:

The correct answer is 3. The int() function truncates the decimal part.

-Edge 2022

Write a function that displays the character that appears most frequently in the string. If several characters have the same highest frequency, displays the first character with that frequency. Note that you must use dictionary to count the frequency of each letter in the input string. NO credit will be given without using dictionary in your program

Answers

Answer:

The function is as follows:

def getMode(str):

occurrence = [0] * 256

dict = {}

for i in str:

 occurrence[ord(i)]+=1;

 dict[i] = occurrence[ord(i)]

 

highest = max(dict, key=dict.get)

print(highest)

Explanation:

This defines the function

def getMode(str):

This initializes the occurrence list to 0

occurrence = [0] * 256

This creates an empty dictionary

dict = {}

This iterates through the input string

for i in str:

This counts the occurrence of each string

 occurrence[ord(i)]+=1;

The string and its occurrence are then appended to the dictionary

 dict[i] = occurrence[ord(i)]

This gets the key with the highest value (i.e. the mode)

highest = max(dict, key=dict.get)

This prints the key

print(highest)

Write a program to implement problem statement below; provide the menu for input N and number of experiment M to calculate average time on M runs. randomly generated list. State your estimate on the BigO number of your algorithm/program logic. (we discussed in the class) Measure the performance of your program by given different N with randomly generated list with multiple experiment of Ns against time to draw the BigO graph (using excel) we discussed during the lecture.

Answers

Answer:

Explanation:

#include<iostream>

#include<ctime>

#include<bits/stdc++.h>

using namespace std;

double calculate(double arr[], int l)

{

double avg=0.0;

int x;

for(x=0;x<l;x++)

{

avg+=arr[x];

}

avg/=l;

return avg;

}

int biggest(int arr[], int n)

{

int x,idx,big=-1;

for(x=0;x<n;x++)

{

if(arr[x]>big)

{

big=arr[x];

idx=x;

}

}

return idx;

}

int main()

{

vector<pair<int,double> >result;

cout<<"Enter 1 for iteration\nEnter 2 for exit\n";

int choice;

cin>>choice;

while(choice!=2)

{

int n,m;

cout<<"Enter N"<<endl;

cin>>n;

cout<<"Enter M"<<endl;

cin>>m;

int c=m;

double running_time[c];

while(c>0)

{

int arr[n];

int x;

for(x=0;x<n;x++)

{

arr[x] = rand();

}

clock_t start = clock();

int pos = biggest(arr,n);

clock_t t_end = clock();

c--;

running_time[c] = 1000.0*(t_end-start)/CLOCKS_PER_SEC;

}

double avg_running_time = calculate(running_time,m);

result.push_back(make_pair(n,avg_running_time));

cout<<"Enter 1 for iteration\nEnter 2 for exit\n";

cin>>choice;

}

for(int x=0;x<result.size();x++)

{

cout<<result[x].first<<" "<<result[x].second<<endl;

}

}

Why computer is known as versatile and diligent device? Explain​

Answers

They work at a constant speed to do the task. Unlike a human, they will not slow down or get bored or start making mistakes that they were not doing earlier. So once they are programmed correctly to do a task, they will do it diligently.

They are versatile because they can be used for all sorts of tasks. They can also do many of the same tasks in different ways. They are diligent because they will do a task thoroughly until it is finished.

What is the function of the NOS? Select all that apply.

•network management
•connects network nodes
•network security
•provides MACs
•gives access to privileges
•data protection

Answers

Answer:

.network management

Explanation:

pls need brainliest

Answer:

gives access privileges

network management

network security

data protection

Explanation:

Kyra needs help deciding which colors she should use on her web page. What can she use to help her decide? (5 points)
.Color selection
.Color theory
.Proofreading
.Storyboarding

Answers

Color theory !!! Step by step explanation: no <3 just take the answer

Correct Answer: Color selection

Select the correct term to complete the sentence.
The
file format is used for video files.

A. .pptx

B. .mp3

C. .jpeg

D. .mp4

Answers

Answer: D. mp4

its mp4 because its always on video files

Which of the following is true? a. There are RFCs that describe challenge-response authentication techniques to use with email. b. Filtering for spam sometimes produces a false positive, in which legitimate email is identified as spam. c. Spam relies heavily on the absence of email authentication. d. All of the above.

Answers

The option that is true is option b. Filtering for spam sometimes produces a false positive, in which legitimate email is identified as spam.

How is spam filtration carried out?

The processing of email to organize it in accordance with predetermined criteria is known as email filtering. The word can allude to the use of human intelligence, although it most frequently describes how messages are processed automatically at SMTP servers, sometimes using anti-spam tactics.

Therefore, Email filtering operates as previously stated by scanning incoming messages for red flags that indicate spam or phishing content and then automatically transferring such messages to a different folder. Spam filters evaluate an incoming email using a variety of criteria.

Learn more about Filtering for spam from

https://brainly.com/question/13058726
#SPJ1

To launch the mail merge help dialog box, what option should you select using the Microsoft word office assistant?​

Answers

Answer:

Complete setup.

Explanation:

Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users type, format and save text-based documents.

A Mail Merge is a Microsoft Word feature that avails end users the ability to import data from other Microsoft applications such as Microsoft Access and Excel. Thus, an end user can use Mail Merge to create multiple documents (personalized letters and e-mails) for each entry in the list at once and send to all individuals in a database query or table.

Hence, Mail Merge is a Microsoft Word feature that avails users the ability to insert fields from a Microsoft Access database into multiple copies of a Word document.

Some of the options available in the Write & Insert Fields group of Mail Merge are;

I. Highlight Merge Fields.

II. Address Block.

III. Greeting Line.

Generally, when a user wants to launch the Mail Merge help dialog box, the option he or she should select using the Microsoft word office assistant is complete setup.

Additionally, the sequential steps of what occurs during the mail merge process are;

1. You should create the main document

2. Next, you connect to a data source

3. You should highlight or specify which records to include in the mail.

4. You should insert merge fields.

5. Lastly, preview, print, or email the document.

Which of the following is NOT a computer hardware?
A) monitor
B) scanner
C) modem
D) Windows 10

Answers

Answer is d hope this helps

All of the following can cause a fatal execution-time error except: Group of answer choices Dereferencing a pointer that has not been initialized properly Dereferencing a null pointer Dereferencing a pointer that has not been assigned to point to a specific address Dereferencing a variable that is not a pointer

Answers

Answer: Dereferencing a variable that is not a pointer

Explanation:

The execution time also refered to as the CPU time pertaining to a given task is the time that is used by the system to execute a task.

Some of the reasons for a fatal execution-time error include:

• Dereferencing a pointer that has not been initialized properly

• Dereferencing a null pointer

• Dereferencing a pointer that has not been assigned to point to a specific address.

It should be noted that dereferencing a variable that is not a pointer doesn't cause a fatal execution-time error.

In python, Create a conditional expression that evaluates to string "negative" if user_val is less than 0, and "non-negative" otherwise.

Answers

I am assuming that user_val is an inputted variable and a whole number (int)...

user_val = int(input("Enter a number: "))

if user_val < 0:

   print("negative")

else:

   print("non-negative")

What does the top-level domain in a URL indicate?
A. the organization or company that owns the website
B. the organization or company that operates the website
C. the protocol used to access the website D. the type of website the URL points to

Answers

Answer:

b i think

Explanation:

A top-level domain (TLD) is the last segment of the domain name. The TLD is the letters immediately following the final dot in an Internet address. A TLD identifies something about the website associated with it, such as its purpose, the organization that owns it or the geographical area where it originates.

Answer:

The answer is D. The type of website the URL points to.

Explanation:

I got it right on the Edmentum test.

what is polymerization1​

Answers

Answer:

Polymerization, any process in which relatively small molecules, called monomers, combine chemically to produce a very large chainlike or network molecule, called a polymer. The monomer molecules may be all alike, or they may represent two, three, or more different compounds.

please give me brainliest~❤︎ت︎

Given a member function named set_age() with a parameter named age in a class named Employee, what code would you use within the function to set the value of the corresponding data member if the data member has the same name as the parameter

Answers

Answer:

Explanation:

This would be considered a setter method. In most languages the parameter of the setter method is the same as the variable that we are passing the value to. Therefore, within the function you need to call the instance variable and make it equal to the parameter being passed. It seems that from the function name this is being written in python. Therefore, the following python code will show you an example of the Employee class and the set_age() method.

class Employee:

   age = 0

   

   def __init__(self):

       pass

   

   def set_age(self, age):

       self.age = age

As you can see in the above code the instance age variable is targeted using the self keyword in Python and is passed the parameter age to the instance variable.        

list and describe each of the activities of technology

Answers

Answer:

network has led to exposure of dirty things to young ones.

air transport has led to losing of lives

If AX contains hex information 2111 and BX contains hex information 4333, what is the content in BX in hex format after performing ASM instruction ADD BX, AX

Answers

Answer:

BX will hold 6444 in hex format.

Explanation:

From the given information:

We need to understand that AX is 64-bit hex number.

When performing ASM instruction (Assembly language instruction),

The addition of 2111 + 4333 = 6444 will be in BX.

This is because ADD, BX, AX will add bx and ax; and the final outcome will be stored in BX.

BX will hold 6444 in hex format.

Write a program that will create an array of random numbers and output the values. Then output the values in the array backwards. SPECIFICATIONS: File name: ArrayBackwards.java Your program must make use of at least one method other than main()to receive full credit (methods can have a return type of void). Suggestion: create and populate the array in the main() method. Make a method for Step 3 below and send in the array as a parameter. Make another method for Step 4 and send in the array as a parameter.

Answers

Answer:

The program is as follows:

import java.util.*;

public class Main{

public static void backward(int [] Rndarray, int lnt){

    System.out.print("Reversed: ");

    for(int itm = lnt-1;itm>=0;itm--){

        System.out.print(Rndarray[itm]+" ");     } }

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

 int lnt = input.nextInt();

 Random rd = new Random();

 int [] Rndarray = new int[lnt];

 for (int itm = 0; itm < lnt; itm++) {

        Rndarray[itm] = rd.nextInt();

        System.out.print(Rndarray[itm]+" ");

     }

     System.out.println();

 backward(Rndarray,lnt); }}

Explanation:

This defines the backward() method

public static void backward(int [] Rndarray, int lnt){

This prints string "Reversed"

    System.out.print("Reversed: ");

This iterates through the array

    for(int itm = lnt-1;itm>=0;itm--){

Each element is then printed, backwards

        System.out.print(Rndarray[itm]+" ");     } }

The main begins here

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

This gets the array length

int  n = input.nextInt();

This creates a Random object

Random rd = new Random();

This declares the array

 int [] Rndarray = new int[lnt];

This iterates through the array for input

 for (int itm = 0; itm < lnt; itm++) {

This generates a random number for each array element

        Rndarray[itm] = rd.nextInt();

This prints the generates number

        System.out.print(Rndarray[itm]+" ");

     }

This prints a new line

     System.out.println();

This passes the array and the length to backward() method

 backward(Rndarray,lnt); }}

(2) What are the limitations of portable computer? ​

Answers

Answer:

Most portable computer are not upgradable and they have a lower specification than most desktop systems

how you use ict today and how will you use it tomorrow

Answers

Answer:

you use it in water today

Explanation:

tomorrow you'll use it in soda

What will the declaration below do to its target?

animation-direction: reverse;
The animation steps will play backward.
The animation steps will play forward, then backward.
The animation steps will play forward.
The animation steps will play backward, then forward.

Answers

The animation steps will play forward then backward

Sixteen stations, numbered 1 through 16, are contending for the use of a shared channel by using the adaptive tree walk protocol. If all the stations whose addresses are prime numbers suddenly become ready at once, how many bit slots are needed to resolve the contention

Answers

Answer:

11 bit slot will be needed

Explanation:

The number of prime numbers between 1 through 16

= 2, 3 , 5, 7, 11 and 13

hence we can say 6 stations are to use the shared channel

Given that all the stations are ready simultaneously

The number of bit slots that will be needed to handle the contention will be 11 bits :

slot 1 : 2, 3, 5 , 7, 11 , 13

slot 2 : 2,3, 5, 7

slot 3 : 2, 3

slot 4 : 2 .   slot 5 : 3 .  slot 6 : 5,7.   slot 7 : 5 .   slot 8 : 7.  slot 9: 11,13.  

slot 10 : 11.   slot 11 : 13

hello! can someone write a c++ program for this problem

Problema 2018.3.2 - Cheated dice
Costica is on vacation and his parents sent him to the country. There he gets terribly bored and looking through his grandfather's closet, he came across a bag full of dice. Having no one to play dice with, but it seemed to him that some of the dice were heavier than the others, Costica chose a dice and started to test it by throwing it with him and noting how many times each face fell. He then tries to figure out whether the dice are rolled or not, considering that the difference between the maximum number of appearances of one face and the minimum number of occurrences (of any other face) should not exceed 10% of the total number of throws.
Requirement
Given a number N of dice rolls and then N natural numbers in the range [1: 6] representing the numbers obtained on the rolls, determine whether the dice is tricked according to the above condition.
Input data
From the input (stdin stream) on the first line reads the natural number N, representing the number of rolls. On the following N lines there is a natural number in the range [1: 6] representing the numbers obtained on throws.
Output data
At the output (stdout stream) a single number will be displayed, 0 or 1, 0 if the dice are normal, and 1 if it is cheated.
ATTENTION to the requirement of the problem: the results must be displayed EXACTLY in the way indicated! In other words, nothing will be displayed on the standard output stream in addition to the problem requirement; as a result of the automatic evaluation, any additional character displayed, or a display different from the one indicated, will lead to an erroneous result and therefore to the qualification "Rejected".
Restrictions and clarifications
1. 10 ≤ N ≤ 100
2. Caution: Depending on the programming language chosen, the file containing the code must have one of the extensions .c, .cpp, .java, or .m. The web editor will not automatically add these extensions and their absence makes it impossible to compile the program!
3. Attention: The source file must be named by the candidate as: . where name is the last name of the candidate and the extension (ext) is the one chosen according to the previous point. Beware of Java language restrictions on class name and file name!
Input data

10
6
6
6
6
6
6
6
6
6
6
Output data
1

Roll the dice 10 times, all 10 rolls produce the number 6. Because the difference between the maximum number of rolls (10) and the minimum number of rolls (0) is strictly greater than 10% of the total number of rolls (10% of 10 is 1), we conclude that the dice are oiled.

Input data
10
1
4
2
5
4
6
2
1
3
3
Output data
0

Throw the dice 10 times and get: 1 twice, 2 twice, 3 twice, 4 twice, 5 and 6 at a time. Because the difference between the maximum number of appearances (two) and the minimum number of occurrences (one) is less than or equal to 10% of the total number of throws (10% of 10 is 1), we conclude that the dice are not deceived.

Answers

Answer:

f0ll0w me on insta gram Id:Anshi threddy_06 (no gap between I and t)

How have technology and social media changed reading?
O A. Physical books can only be read on the web.
B. Now reading is a conversation of give and take.
O C. People no longer have to read anything at all.
D. Reading often takes much longer to undergo.

Answers

Answer:

B?

Explanation:

I'm super sorry if I get this wrong for you but after thinking so much I probably think it would be B

Answer:

the guy above is right it is B

Explanation:

because 2+2=4

Other Questions
explain how soil can affect the composition of the solution that move through it Help please!!! Best answer will get brainliest!!! which one is right please help True or False: XYZ has sides XY, YZ and XZ that measure 15 cm, 20 cm, and 25 cm respectively is a right triangle.Please answer please The two distinct layers of the integument consist of a layer of stratified squamous epithelium called the ______ and a deeper layer of areolar and dense irregular connective tissue called the ______. Suppose that your drawer contains 8 AAA batteries but only 6 of them are good. If you randomly select 4 batteries what is the probability all 4 will work ? 34. Which statement describes what occurs in thefollowing redox reaction?Cu(s) + 2Ag (aq) Cu2+ (aq) + 2Ag(s)(1) Only mass is conserved.(2) Only charge is conserved.3 Both mass and charge are conserved.(4) Neither mass nor charge is conserved. A network consists of 75 workstations and three servers. The workstations are currently connected to the network with 100 Mbps switches, and the servers have 1000 Mbps connections. Describe two network problems that can be solved by replacing the workstations' 100 Mbps switches and NICs with 1000 Mbps switches and NICs. What potential problems can this upgrade cause what are some actual metaphors and alliterations in the book coraline Peter, who is the owner of a Wagon R, publishes an advertisement on Ikman.lk for the sale of his vehicle quoting a price of LKR 3,500,000/=. John calls Peter and says that he agrees to buy the Wagon R for the quoted price by way of a Crossed Cheque. Peter replies John and says that he has no intention of selling the Wagon R even though he published an advertisement on Ikman.lkDiscuss the application of law of contracts relating to offer and acceptance as well as law relating to cheques. Find the area of the shape shown below. Can someone please help? How would a person practice wu wei? Help fast pleaseCommon lit Knock KnockPart A : which of the following identifies a theme of the text?Part B : which section best supports the answer to part APart A : how does the first half of the poem compare to the second half?Part B : which two details from the text best support the answer to part A ?How does the conclusion in lines 63-69 contribute to the development of ideas in the text? Work out the value of angle x Pl help its for a grade I will give Brainly if right Exponential functions are in the form f(x)=a(b)xh+k. What does a negative "a" value do the graphed equation? Moves the equation "a" spaces rightMoves the equation "a" spaces rightMoves the equation "a" spaces leftMoves the equation "a" spaces leftThe "a" value can't be negativeThe "a" value can't be negativeReflects the graph over the y-axisReflects the graph over the y-axisReflects the graph over the x-axisplease answer as soon as possible for brainlist in a school ,the number of boys who play cricket is 3 times as much as a number of boys who play tennis. if 12 boys, who play cricket, play tennis instead, the number of boys who play each of these sports would be the same. find the number of boys who play tennis when a vegetable gets put in salt water and collapses why does this happen Health care is not free to everyone becauseA) It is a for-profit industry.B) People do not care about the sick.C) There is no legislation requiring hospitals to care for people.D) There are religious restrictions. Silas took 17 bags of glass to the recycling center. He still has 8 bags of plastic to take to the recycling center. Which equation couldbe used to find x, the total number of bags of glass and plastic Silas will take to the recycling center? A.x-8=-17 B.17-x=8 C. X+17=8 D. X-17=8