Answer:
Explanation:
From the given information:
The CPU and I/O behavior of three process timings in seconds are as shown in the image below. Not only that, the Gantt Charts and the Average Turnaround time for the scheduling algorithms were also calculated.
NOTE:
AT = arrival time
BT = Brief-time
TAT = turn around time
Turnaround Time TAT = CT - BT
Waiting Time = TAT - BT
Average TAT = 32.7/3
= 10.9 sec
Average TAT = 10.9 sec
From the attached images below showing the process and charts; we can conclude that it implies that P1, P2, P3 are scheduling in these sequences from time to time period.
Why did Elena Gilbert Turn her humanity off when she was sired to Damon? (In The Vampire Diaries)
Answer:
Ok, so when her brother died she couldn't take it and was in denial for like the longest time. And since she was still sired to Damon bofre her humanity was off she could still listen to him.
Explanation:
g Consider the turning point problem again, but this time you are given a sequence of at least three integers, which consists of a decreasing subsequence followed by an increasing subsequence. Using the divide and conquer technique, develop a recursive algorithm that finds the index of the turning point in the sequence (that is, the point where it transitions from a decreasing subsequence to an increasing subsequence). For example, in the sequence [43 30 16 10 7 8 13 22], the integer 7 is the turning point and its index is equal to 4 (assuming the starting index is 0). So, the algorithm should return 4
Answer:
Explanation:
The following code is written in Python, it creates a recursive function that takes in a list as a parameter, then compares the first two items in the list if the first is greater, it increases the index by one and calls the function again. This is done until the turning point is found, it then prints out the position of the turning point int the list.
def find_turning_point(list, x=0):
if list[x] > list[x + 1]:
x += 1
return find_turning_point(list, x)
else:
return "The turning point position is: " + str(x)
Design a software system for a bookstore that keeps an inventory of two types of books: Traditional books and books on CD. Books on CD may also contain music. The bookstore purchases books from publishers and sets a price for each book. Customers can purchase books from the bookstore, using either cash or a credit. The bookstore keeps track of which books it has in its inventory, and the books purchased by each customer
a. What are the objects in your object- oriented Solution?
b. What are the interactions between objects in your solution?
c. Which objects "have" other objects?
d. Which Objects "Use" other objects?
e. Which objects are other objects?
Answer:
Explanation:
a. In this scenario, the best solution would have an Object of Traditional Books, CD, Music, Bookstore and Customer.
b. All five objects would be able to be called by the main program loop and the Customer Object would call upon and use either the Books or CD object, While the Bookstore object would call upon all of the other objects.
c. Both the Bookstore object and Customer object will "have" other objects as the Bookstore needs to hold information on every Book or CD in the Inventory. While the Customer object would call upon the Book and CD object that they are purchasing.
d. The Music Object will extend the CD object and use information on the CD object as its parent class.
e. Since the Music Object extends the CD object it is also considered a CD since it is in CD format like the Books on CD and therefore is both objects.
It is for employees to make mistakes that compromise the security of an organization’s computer devices and sensitive information.
impossible
difficult
easy
Answer: Easy
Explanation: Correct on my Edg 2021.
It is simple for employees to make mistakes that jeopardize a company's computer system security and sensitive data.
What exactly is sensitive data?Sensitive information has been defined as personal data that includes facts or opinions concerning a person's race or ethnicity. political affiliations or beliefs. beliefs in religion or philosophy. Data that needs to be shielded from unwanted access in order to protect the security or privacy of a person or organization is considered sensitive information.
Pattern-based classifiers called sensitive information types (SIT) are used. To see a complete list of all SITs, see Sensitive information types entity definitions. They look for sensitive information like social security, credit card, or bank account numbers to identify sensitive things.
Therefore, It is simple for employees to make mistakes that jeopardize a company's computer system security and sensitive data.
To know more about sensitive information visit;
brainly.com/question/26191875
#SPJ3
You were just hired as an IT Specialist for Smalltown School District. Your first assignment is to review a problem area& in student records processing. It seems that the program currently used to compute student grade point averages and class rankings runs terribly slow and as a result end of year reports are habitually late. Your are asked to come up with a list of items that should be checked in order to determine if a modification to code is in order. The IT department head is asking you to do this without the opportunity to actually see the current application/programs in use. What questions would you ask about the current code? What areas of code would you look at? What would you need to know about the student data?
Answer:
Explanation:
There are various questions that you can ask in this scenario, such as
What grading policies are being implemented?
How many student grades are being calculated by the program?
What is the requirements for a student to pass?
All of these questions would allow you to get an idea of how extensive the code may be and its complexity. Once you know this you would look at the code revolving around actually looping through the data and doing the necessary calculations. You can then determine how to manipulate the code and make it much more efficient.
You would also need to know how the student data is being saved, which will help determine if it is the best data structure for saving this type of data or if it can be replaced in order to maintain the data secure while increasing the speed of the program. Mainly since this information needs to be continuously used from the data structure.
A mathematical process of coding information so that only the intend user can read it
Answer:
asymmetric encryption with the intended user's public key.
Explanation:
Only that user will be able to decrypt the information.