Consider a multiprocessor CPU scheduling policy. There are 2 options: 1) a singlecommon ready queue of jobs; when a CPU becomes free, the job atthe head of the queuegoes to this free CPU. 2) a ready queue for each CPU; the arriving job joins the shortestqueue. In general, do you expect the common queue or the shortest queue policy to performbetter. Justify.

Answers

Answer 1

Explanation:

A ready queue is more adequate since in this method the load balancing occurs in a proper way. The goal of multiple processing is the correct distribution of load.

But in the cases when a processor is doing quicker or taking a smaller queue, it will self assign processes allotted for execution, configuring it with a constant busy state.


Related Questions

Which part of the formula is the argument?

=COUNTIF(A1:E59, "Greene City")

=

()

COUNTIF

A1:E59

Answers

Answer:

e on edege

Explanation:

just took the question on edge

Answer:

Guy above is right!

Explanation:

write a program that calculates the total grade for N classroom exerices as a perfentage. the user should input the value for N followed by each of the N scores and totals.

Answers

Answer:

earned = 0

total = 0

exercises = int(input("Enter the number of exercises: "))

for i in range(exercises):

   score = int(input("Enter score" + str(i+1) + ": "))

   total_score = int(input("Enter total score for exercise " + str(i+1) + ": "))

   

   earned += score

   total += total_score

print("The total is %" + str(earned/total * 100))

Explanation:

*The code is in Python.

Set the earned and total as 0

Ask the user to enter the number of exercises

Create a for loop that iterates number of exercises times. For each exercise;

Ask the user to enter the score earned and total score of that exercise

Add the score to the earned (cumulative sum)

Add the total_score to the total (cumulative sum)

When the loop is done, calculate the percentage, divide earned by the total and multiply the result by 100, and print it

(1) Prompt the user to enter a string of their choosing. Output the string.
Ex: Enter a sentence or phrase: The only thing we have to fear is fear itself. You entered: The only thing we have to fear is fear itself.
(2) Complete the GetNumOfCharacters() function, which returns the number of characters in the user's string. Use a for loop in this function for practice. (2 pts)
(3) In main(), call the GetNumOfCharacters() function and then output the returned result. (1 pt) (4) Implement the OutputWithoutWhitespace() function. OutputWithoutWhitespace() outputs the string's characters except for whitespace (spaces, tabs). Note: A tab is '\t'. Call the OutputWithoutWhitespace() function in main(). (2 pts)
Ex: Enter a sentence or phrase: The only thing we have to fear is fear itself. You entered: The only thing we have to fear is fear itself. Number of characters: 46 String with no whitespace: The only thing we have to fear is fear itself.

Answers

Answer:

The solution is given in the explanation section

See comments for detailed explanation of each step

Explanation:

import java.util.Scanner;

class Main {

 public static void main(String[] args) {

   //Prompting the User to enter a String

   System.out.println("Enter a sentence or phrase: ");

   //Receiving the string entered with the Scanner Object

   Scanner in = new Scanner (System.in);

   String user_word = in.nextLine();

   //OutPuting User entered string

   System.out.println("You entered: "+user_word);

   //Calling the GetNumOfCharacters Method

   System.out.println("Number of characters: "+ GetNumOfCharacters(user_word));

   //Calling the OutputWithoutWhitespace Mehtod

   System.out.println("String with no whitespace: "+OutputWithoutWhitespace(user_word));

   }

   //Creating the function GetNumOfCharacters()

   //This function will return the number of characters

 // in the string entered by the user_word

 public static int GetNumOfCharacters (String word) {

   int noOfCharacters = 0;

   for(int i = 0; i< word.length(); i++){

     noOfCharacters++;

   }

   return noOfCharacters;

 }

 //Creating the OutputWithoutWhitespace() method

 //This method will remove all tabs and spaces from the original string

 public static String OutputWithoutWhitespace(String word){

   //Use the replaceAll all method of strings to replace all whitespaces with no space.

   String new_string = word.replaceAll(" ","");

   return new_string;

 }

}

Remove gray from RGB Summary: Given integer values for red, green, and blue, subtract the gray from each value. Computers represent color by combining the sub-colors red, green, and blue (rgb). Each sub-color's value can range from 0 to 255. Thus (255, 0, 0) is bright red, (130, 0, 130) is a medium purple, (0, 0, 0) is black, (255, 255, 255) is white, and (40, 40, 40) is a dark gray. (130, 50, 130) is a faded purple, due to the (50, 50, 50) gray part. (In other words, equal amounts of red, green, blue yield gray). Given values for red, green, and blue, remove the gray part.

Answers

Answer:  

Here is the C++ program:  

#include <iostream>   //to use input output functions    

using namespace std;   //to identify objects cin cout    

int main() {   //start of main method    

int red,green,blue,smallest;   //declare variables to store integer values of red,green, blue and to store the smallest value    

cout<<"Enter value for red: ";  //prompts user to enter value for red    

cin>>red;  //reads value for red from user    

cout<<"Enter value for green: ";  //prompts user to enter value for green  

cin>>green; //reads value for green from user    

cout<<"Enter value for blue: "; //prompts user to enter value for blue    

cin>>blue;   //reads value for blue from user    

//computes the smallest value  

if(red<green && red<blue) //if red value is less than green and blue values    

smallest=red;   //red is the smallest so assign value of red to smallest    

else if(green<blue)   //if green value is less than blue value    

smallest=green; //green is the smallest so assign value of green to smallest  

else //this means blue is the smallest    

smallest=blue;  //assign value of blue to smallest    

//removes gray part by subtracting smallest from rgb  

red=red-smallest; //subtract smallest from red    

green=green-smallest; //subtract smallest from green    

blue=blue-smallest; //subtract smallest from blue    

cout<<"red after removing gray part: "<<red<<endl;  //displays amount of red after removing gray    

cout<<"green after removing gray part: "<<green<<endl; //displays amount of green after removing gray  

cout<<"blue after removing gray part: "<<blue<<endl;  } //displays amount of blue after removing gray  

Explanation:  

I will explain the program using an example.    

Lets say user enter 130 as value for red, 50 for green and 130 for blue. So  

red = 130    

green = 50

blue = 130  

First if condition if(red<green && red<blue)   checks if value of red is less than green and blue. Since red=130 so this condition evaluate to false and the program moves to the else if part else if(green<blue) which checks if green is less than blue. This condition evaluates to true as green=50 and blue = 130 so green is less than blue. Hence the body of this else if executes which has the statement: smallest=green;  so the smallest it set to green value.    

smallest = 50    

Now the statement: red=red-smallest; becomes:    

red = 130 - 50    

red = 80    

the statement: green=green-smallest;  becomes:    

green = 50 - 50    

green = 0    

the statement: blue=blue-smallest; becomes:    

blue = 130 - 50    

blue = 80    

So the output of the entire program is:    

red after removing gray part: 80                                                                                                 green after removing gray part: 0                                                                                                blue after removing gray part: 80    

The screenshot of the program along with its output is attached.

How does asymmetric encryption work?
A.
It uses only one key to encrypt and decrypt a message.
B.
A private key is used to encrypt the message and the public key is used to decrypt the message.
C.
Either the public key or the private key can be used to encrypt and decrypt a message.
D.
Public key is used to encrypt the message and private key is used to decrypt the message.

Answers

Answer:

i choose choice D

Explanation:

reason as to my answer public keys are simply input keys used to encrypt data into either a computer or any electrical device as private keys are out put used to either erase or edit

For this assignment, you will create flowchart usingFlowgorithm and Pseudocode for the following program example:You are to design a program for Alexander’s Coffee Shopproviding customer research data. When a customer places an order,the clerk asks the customer for their zip code and age. The clerkenters this data as well as the number of items purchased. Theprogram should operate continuously until the clerk enters a 0 forthe zip code at the end of the day. If the clerk enters an invalidage (defined as less than 10 or more than 100), an error message isdisplayed and the program re-prompts the clerk continuously toenter a valid age. At the end of the program, display the averagecustomer age as well as counts of the number of items ordered bycustomers under the age of 25 and customers 25 and older.

Answers

Answer:

The flowchart is attached

Oredered accordinly with the flowcahrt number

Wrire a code that display elements at indices 1 and 4 in the follwoing array.

var userArray = [1, 6, 41, 8, 24, 4];

Answers

Answer:

Console.log(userArray[1]);

Console.log(userArray[4]);

Explanation:

The programming language was not stated; however, the variable declaration implies JavaScript.

JavaScript prints using the following syntax:

Console.log(print-name);

Since, the code is to print some elements of array userArray.

First, we need to determine the index of the elements.

The indices are given as 1 and 4.

So, the code to print these elements is as follows:

Console.log(userArray[1]);

Console.log(userArray[4]);

what is Service Operations in ITIL​

Answers

Explanation:

the objective of ITIL service operations is to make sure that IT services are delivered effectively and efficiently. the service operation life cycle stage includes the fulfilling of user requests, resolving service failure fixing problems and also carrying out routine operational tasks

A have a string, called "joshs_diary", that is huge (there was a lot of drama in middle school). But I don't want every one to know that this string is my diary. However, I also don't want to make copies of it (because my computer doesn't have enough memory). Which of the following lines will let me access this string via a new name, but without making any copies?

a. std::string book = joshs_diary;
b. std::string & book = joshs_diary; const
c. std::string * book = &joshs_diary;
d. std::string book(joshs_diary);
e. const std::string & book = joshs_diary;
f. const std::string * const book = &joshs_diary;
g. std::string * book = &joshs_diary;

Answers

Answer:

C and G

Explanation:

In C language, the asterisks, ' * ', and the ampersand, ' & ', are used to create pointers and references to pointers respectively. The asterisks are used with unique identifiers to declare a pointer to a variable location in memory, while the ampersand is always placed before a variable name as an r_value to the pointer declared.

Write a C program to prform simple C aritlimetic calculations. The user is to enter a simple expression(integer operaior integer) such as 15+30=45. The program is to exlract the 2 operands and the operator, perform the indicated calculation and display the result. For examole15 + 30 = 45. Operators should includc t, -, * , l, and %'.Operands are prcsitive integers, no sign. Use getchar to input the cxpression. Allow for variable spacing before the first operand and between operators and operands.

Answers

Answer:

Here is the C program:

#include <stdio.h>  //to use input output functions

//functions prototype

unsigned int mod(unsigned int a, unsigned int b);  

unsigned int mul(unsigned int a, unsigned int b);  

unsigned int sub( unsigned int a,unsigned int b);

float divide(unsigned int a,unsigned int b);  

unsigned int add( unsigned int a,unsigned int b);  

int main()  {  //start of main method

unsigned int a, b;   //declare variables to store the operands

char d;  //declare variable to store the operator

printf("Enter an operator:  ");   //prompts user to enter an operator

scanf("%c",&d);  //reads the operator from use

getchar();  //gets a character

while (d!='q')   { //keeps iterating until user enters q to quit

printf("Enter 1st operand: ");   //prompts user to enter first operand

scanf("%d",&a);   //reads first operand from user

getchar();  //reads character

printf("Enter 2nd operand: ");   //prompts user to enter second operand

scanf("%d",&b);   //reads second operand from user

getchar();  

if (d=='%')  {   //if the character of operator is a mod

printf("%d",a);  //prints operand 1

putchar(d);  //displays operator

printf("%d",b);  //displays operand 2

printf(" = ");  //displays =

mod(a,b);  }  //displays computed modulo of two input operands

if (d=='*')   //if the input character is for multiplication operator

{printf("%d",a);  //prints operand 1

putchar(d);  //displays operator

printf("%d",b);  //displays operand 2

printf(" = ");  //displays =

mul(a,b); }  //displays computed multiplication

if (d=='+')  {  //if the input character is for addition operator

printf("%d",a);  //prints operand 1

putchar(d);  //displays operator

printf("%d",b);  //displays operand 2

printf(" = "); // displays =

add(a,b);  }   //displays computed addition

if (d=='/')  {  //if the input character is for division operator

printf("%d",a); // prints operand 1

putchar(d);  //displays operator

printf("%d",b);  //displays operand 2

printf(" = ");  //displays =

divide(a,b);  }   //displays computed division

if (d=='-')  {  //if the input character is for subtraction operator

printf("%d",a);  //prints operand 1

putchar(d);  //displays operator

printf("%d",b); // displays operand 2

printf(" = ");  //displays =

sub(a,b);  }  //displays computed subtraction

printf("Enter an operator: ");   //asks again to enter an operator

scanf("%c",&d);  //reads operator from user

getchar();  }  }   //gets character

unsigned int mod( unsigned int a, unsigned int b){  //function to compute modulo of two integers with no sign

     int c = a%b;  //computes mod

    printf("%d",c);  }  //displays mod result

unsigned int add(unsigned int a, unsigned int b){     // function to compute addition of two integers

    int c = a+b; //computes addition

    printf("%d\n",c);  } //displays result of addition

unsigned int mul(unsigned int a, unsigned int b){       //function to compute multiplication of two integers

    int c = a*b;  //multiplies two integers

   printf("%d\n",c); }  //displays result of multiplication

float divide(unsigned int a, unsigned int b){   //function to compute division of two integers

    float c = a/b;  //divides two integers and stores result in floating point variable c

    printf("%f\n",c);  } //displays result of division

unsigned int sub(unsigned int a, unsigned int b){       //function to compute subtraction of two integers

    int c = a-b;  //subtracts two integers

    printf("%d\n",c);  }  //displays result of subtraction

Explanation:

The program is well explained in the comments mentioned with each line of the program. The program uses while loop that keeps asking user to select an operator and two operands to perform arithmetic calculations. The if conditions are used to check what arithmetic calculation is to be performed based on user choice of operand and calls the relevant function to perform calculation. There are five functions that perform addition, modulo, subtraction, division and multiplication and display the result of computation. The screenshot of output is attached.

in your own experience,imagine if someone gained access to any of your social media accounts they could changed your account name,password and recovery data in order to lock you out and take total control. they could even go as far as pretending to be you and send out compromised messages to your contacts and this list is endless really. To help you stay safe from hackers and protect your social media accounts​

Answers

Answer: yes

Explanation: because they now have your info

How many components does a network have ?

Answers

Answer:

There are three primary components to understanding networks: 1. Physical Connections; 2. Network Operating System; and 3. Application Component. Hope this helps!

Explanation:

Create an interface called Runner. The interface has an abstract method called run() that displays a message describing the meaning of run to the class. Create classes called Machine, Athlete, and PoliticalCandidate that all implement Runner.
The run() should print the following in each class:
Machine - When a machine is running, it is operating.
Athlete - An athlete might run in a race, or in a game like soccer.
PoliticalCandidate - A political candidate runs for office.
----------------------------------------------------------------------------------------------------
public class Athlete implements Runner
{
public void run()
{
// write your code here
}
}
--------------------------------------------------------------------------------------
public class DemoRunners
{
public static void main(String[] args)
{
Machine runner1 = new Machine();
Athlete runner2 = new Athlete();
PoliticalCandidate runner3 = new PoliticalCandidate();
runner1.run();
runner2.run();
runner3.run();
}
}
------------------------------------------------------------------------------------------
public class Machine implements Runner
{
public void run()
{
// write your code here
}
}
----------------------------------------------------------------------------------------------------
public class PoliticalCandidate implements Runner
{
public void run()
{
// write your code here
}
}
----------------------------------------------------------------------------------------------------
public interface Runner
{
// write your code here
}
----------------------------------------------------------------------------------------------------

Answers

Answer:

Here is the interface Runner:

public interface Runner  {  //interface Runner

public abstract void run();  } //abstract method run that displays a message describing the meaning of run to the class

/*Here Runner is the interface which is an abstract class. It is used to group related methods such as here is run method with empty body. An abstract method run() does not have a body. The body is provided by the sub classes Machine, Athlete, and PoliticalCandidate that all implement Runner.  */

Explanation:

Here is the Athlete class:

public class Athlete implements Runner  {  //class that implements Runner interface

public void run()  {  //interface method accessed by Athlete to provide its body according to describe the meaning of run to the class

    System.out.println("An athlete might run in a race, or in a game like soccer.");  } }    //prints this message

Here is the Machine class:

public class Machine implements Runner  {

public void run()  {

System.out.println("When a machine is running, it is operating.");  }}

Here is the PoliticalCandidate class:

public class PoliticalCandidate implements Runner  {

public void run()  {

System.out.println("A political candidate runs for office.");  } }

/*To access the interface Runner method run(), the Runner must be "implemented" by Machine, Athlete, and PoliticalCandidate classes with the implements keyword. The body of the interface method run() is provided by the "implement" class */      

Here is the DemoRunners class:

public class DemoRunners {  //class name

public static void main(String[] args)  {  //start of main method

Machine runner1 = new Machine();  //creates object of Machine class

Athlete runner2 = new Athlete();  //creates object of Athlete class

PoliticalCandidate runner3 = new PoliticalCandidate();  //creates object of PoliticalCandidate class

runner1.run();  //uses object of Machine class to call run method

runner2.run();  //uses object of Athlete class to call run method

runner3.run();  } } //uses object of PoliticalCandidate class to call run method

When runner1.run() is called it invokes the run() method of class Machine which displays the message:

When a machine is running, it is operating.

When runner2.run() is called it invokes the run() method of class Athlete which displays the message:

An athlete might run in a race, or in a game like soccer.  

When runner3.run() is called it invokes the run() method of class PoliticalCandidate which displays the message:

A political candidate runs for office.

The screenshot of the program is attached.

Explain why you have to import JOptionPane but not the Math class​

Answers

Answer:

To provide standard dialog boxes such as message dialog box, confirm dialog box and input dialog box.

In Java, the import statement is used to include classes or packages from outside sources in your code. This lets you access and use the features of those classes or packages.

What is the JOptionPane

To do the above, You need to import JOptionPane in Java because it belongs to a different package from the Math class.

The Math class is a part of the java. lang package, which is automatically included in Java. This package has important classes and interfaces that are used in Java programs. Because the Math class is already included in this package, you don't have to import it separately.

Read more about  JOptionPane here:

https://brainly.com/question/13101293

#SPJ2

A country, called Simpleland, has a language with a small vocabulary of just “the”, “on”, “and”, “go”, “round”, “bus”, and “wheels”. For a word count vector with indices ordered as the words appear above, what is the word count vector for a document that simply says “the wheels on the bus go round and round.”

Please enter the vector of counts as follows: If the counts were ["the"=1, “on”=3, "and"=2, "go"=1, "round"=2, "bus"=1, "wheels"=1], enter 1321211.
1 point

Answers

Answer:

umm that is a todler song

Explanation:

umm that is a todler song that they sing to them when there crying

A country, called Simpleland, has a language with a small vocabulary of just “the”, “on”, “and”, “go”, “round”, “bus”, and “wheels”. As per the given scenario, the vector of counts will be 2111211. The correct option is C.

What are the ways to count items in a vector?

C++ has a built-in function that counts the length of the vector. Size is the function's name ().

It returns the size or total number of elements of the vector that was utilized to create it. There is no need for debate.

The number of observations (rows) includes deleted observations as well. In an SAS data collection, there can be a maximum of 2 63-1 observations, or roughly 9.2 quintillion observations. For the majority of users, going above that limit is quite rare.

The vector of counts in the above scenario will be 2111211.

Thus, the correct option is C.

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ2

The government of a country wants to know how much inbound tourism (number of tourists visiting from other countries) is contributing to the country’s economic prosperity. The research firm hired to conduct this study surveys 10,000 residents on their favorite spots to visit in the country and how much money they spend on leisurely activities

a. How could the use of a sample like this threaten the value of the study’s outcomes?

b. How might the flawed sample affect the usefulness of the results?

Answers

Answer and Explanation:

A. The study by the research team may not reflect the purpose of the research which is to know how much inbound tourism is contributing to the economy. They are sampling the population on their favorite spots to visit( which may be too narrow here) and what their leisure activities are (which are not the only things tourists spend on). Also 10000 residents may be too small as a sample to reflect more accurate study outcome representative of the population.

2. A flawed sample which is a sampling error would not represent the population as the results from sample would contradict population results

we cannot create a blank table true or false​

Answers

I believe that that statement is true

The two statements belowchar dance1[ ] = {'F','o','x','t','r','o','t'};String dance2 = new String(dance1);will generate an error message:

a. because char variables and String variable do not mix.
b. will generate an error message because char variables and String variable do not mix.
c. show that a String variable, like dance2, is an array.
d. demonstrate that a character array can be used to construct a String object.
e. prove that character variables and String variables are identical.

Answers

Answer:

D. Demonstrate that a character array can be used to construct a String object.

Explanation:

Option D answers the question.

This is so because:

The first line of the code segment creates a char array element i.e. dance1

The second line of the code segment creates a String variable, dance2.

dance2 is then initialised by concatenating the elements in dance1.

i.e. The value of dance2 is

dance2 = "Foxtrot"

Hence, option D answers the question

James uses a database to track his school's football team. Which feature in a database allows James to find a specific player by name?

Grid
Filter
Search
Sort

Answers

Search if he knows the players name

Answer:

search

Explanation:

what are the example of malware spreads

a. social network
b. pirated software
c.removable media
d. all of the above​

Answers

The answer has to be
D. All of the above

Examples of malware spreads include all of the options mentioned: social networks, pirated software, and removable media.

The correct option is d.

a. Social networks: Malware can spread through social networks via malicious links or infected attachments shared within messages, posts, or comments. Users may unknowingly click on these links or download infected files, which can then propagate the malware to their devices or their contacts.

b. Pirated software: Malicious actors often distribute malware-infected versions of popular software through illegitimate channels. Users who download and install pirated software are at risk of unknowingly introducing malware onto their systems, as these versions may be modified to include malicious code.

c. Removable media: Malware can also spread through removable media such as USB drives, external hard drives, or even CDs/DVDs. If an infected device or media is connected to a computer, the malware can transfer onto the system, potentially infecting files and spreading further.

Therefore, all of the options (a, b, and c) are examples of how malware can spread, highlighting the importance of practicing safe online habits, avoiding pirated software, being cautious with links and attachments, and regularly scanning removable media to mitigate the risk of malware infections.

To learn more about malware spreads;

https://brainly.com/question/31115061

#SPJ2

is the core of an operating system that controls its basic functions.
O Freeware
O Kernel
Tweaker
O Open source

Answers

Answer:

Explanation:

Tweaker

ANSWER

Its Kernel

Explanation:

i got a 100%

help me plzz thank you if your right I will mark brainiest

Answers

Answer:

the 1,2, and 3 are the second circle thingy and the fourth question is the first circle thing and dont know the last one hope this helps

Explanation:

Answer in this order.
B, B, B, B, A. I’m 80% sure these are the right answers.

In __________ write, the data are stored in the cache, and control returns to the caller. Select one: a. a synchronous b. a buffered c. an asynchronous d. a non-buffered

Answers

Answer:

The correct answer to the question is option C (an asynchronous)

Explanation:

Computer store files in its temporary data storage space so as to facilitate easy retrievals when needed. Cache memory is in the temporary data storage space of the computer, faster than any other system memory so that when the processor requests information from the computer memory after a user place a command, the cache memory makes the information available in a short time when the data are required eliminating delay when ram will have to take time to fetch the data to provide to the processor.

In an asynchronous write, the data are stored in the cache to enable easy retrieval by the computer processor just as the cache is explained above, it allows writing data to the cluster. Asynchronous write also allows control returns to the caller.

IT professionals have a responsibility to find and use wireless devices that have which of the following features? Check all of the boxes that apply.

compatibility

ability to work well with other wireless devices

ability to communicate wirelessly with other devices, such as a printer and laptop

preloaded with the latest apps

Answers

Answer:

a b c

Explanation:

Answer:

compatibility

ability to work well with other wireless devices

ability to communicate wirelessly with other devices, such as a printer and laptop

describe how to get started on a formal business document by using word processing software

Answers

Answer:Click the Microsoft Office button.

Select New. The New Document dialog box appears.

Select Blank document under the Blank and recent section. It will be highlighted by default.

Click Create. A new blank document appears in the Word window.

Explanation:

Which categories format cells? Check all that apply. currency percentage data month date text

Answers

Answer:

currency

percentage

date

text

Explanation:

The category of format cells are currency, percentage, data, month, date, and text. The all options are correct.

What is Format Cells dialog box?

In the Format Cells dialog box, you can configure the formatting options for your report objects.

For a row or column header and the values, you can format the number, font, alignment, border, and pattern.

The format cells command in Excel is used to change the formatting of cell numbers without changing the actual number.

We can change the number, alignment, font style, border style, fill options, and protection using the format cells. We can get to this option by right-clicking the mouse.

Currency, percentage, data, month, date, and text are examples of format cells.

Thus, all options are correct.

For more details regarding format cell, visit:

https://brainly.com/question/24139670

#SPJ2

What is the critical path?


Calculate the minimum overall project completion time and identify which activities are critical by filling out the chart below-forward and backward pass.

What is the maximum time to complete the projects?


Early start Early Finish late start Late finish Slack Critical path?


A
B
C
D
E
F
G
H


Please answer and thank you

Answers

Answer:

yeeeee

Explanation:yeeees quen                   HI SISTERS HI SISTERS

Complete the sentence.
You can buy new applications at a retail store on DVD for ____.

O laptops
O smartphones
O tablets

Answers

Answer:

laptops

Explanation:

B

You can buy new applications at a retail store on DVD for laptops. Thus, option A (laptops) is correct.

What is a DVD?

A website is an accumulation of internet pages and related items that is posted on at least one server and given an unique domain name. Most blogs focus on a single subject or objective, such as reporting, education, industry, entertaining, or photo sharing.

A raster-based photograph designed for the web and publishing is stored as a JPG file. The JPG format is the default file format for image sensors and is the most widely used picture format on the web because of its universal compatibility and decompression. Portraits in both colour and black and white work brilliantly with them.

Therefore, option A (laptops) is the correct option.

Learn more about DVD, here:

https://brainly.com/question/13664390

#SPJ6

Main topics: Basic Java program
Programmatic output
Arithmetic Expressions
User input
Program Specification:
Write a Java program that calculates and outputs a baseball pitcher’s ERA in a reasonable report format. "ERA" is an acronym for "earned run average" and is computed using the following equation: number of earned runs multiplied by 9 and divided by number of innings pitched Your program must do the following: • Prompt the user for the first and last name of the pitcher and store them in two variables of type String • Prompt the user for the pitcher’s number of earned runs and store it in a variable of type int • Prompt the user for the pitcher’s number of innings pitched and store it in a variable of type int • Compute and output the pitcher’s ERA, which should be a (double) floating point number Sample run(s): Pitcher’s first name: Josh Pitcher’s last name: Hader Number of earned runs: 22 Number of innings pitched: 81 Josh Hader has an ERA of 2.4444444444444446

Answers

Answer:

Explanation:

import java.util.Scanner;

public class pitcherValues {

   public static void main(String[] args) {

       String firstName, lastName;

       int earnedRuns, inningsPitched;

       double ERA;

      Scanner in = new Scanner(System.in);

     System.out.println("Pitchers First Name is?");

     firstName = in.nextLine();

     System.out.println("Pitchers Last Name is?");

     lastName = in.nextLine();

     System.out.println("How many runs did the Pitcher earn?");

     earnedRuns = in.nextInt();

     System.out.println("How many innings did the Pitcher Pitch?");

     inningsPitched = in.nextInt();

     ERA = (earnedRuns * 9) / inningsPitched;

     System.out.println(firstName + " " + lastName + " has an ERA of " + ERA);

   }

}

CPU BENCHMARKS are measurements used to compare performance between processors

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

CPU benchmarks are used to picking the best CPU. If you want to pick the best CPU for the kind of work you do is easier if you research some performance benchmarks.

As you know, CPU benchmarks are measurements used to compare performance between processors. These benchmarks are the measure to know the performance of CPU.

These CPU Benchmarks are generated by running software programs specifically designed to push the limits of CPU performance.

Other Questions
The sum of -3/8 and 2 2/3 slope of one dotted lines:slope of the reflection line: the south had an advantage during the war because they had more railway lines in the north truefalse slope = 3/2, (2,7) is on the line i need help plz thank you Zeno Inc. sold two capital assets in 2019. The first sale resulted in a $53,000 capital loss, and the second sale resulted in a $25,600 capital gain. Zeno was incorporated in 2015, and its tax records provide the following information: 2015 2016 2017 2018 Ordinary income $443,000 $509,700 $810,300 $921,000 Net capital gain 22,000 0 4,120 13,600 Taxable income $465,000 $509,700 $814,420 $934,600 Required:a. Compute Zenos tax refund from the carryback of its 2019 nondeductible capital loss. Assume Zeno's marginal tax rate was 34 percent in 2015 through 2017, and 21 percent in 2018. b. Compute Zenos capital loss carryforward into 2020. the element iridium is more resistant to corrosion than any other metal. it also has a slightly smaller density than osmium: 22.42 centimeters squared. suppose you have a sample of iridium with a volume of 34.17 cm squared. what is the mass of this sample How many relay stations (cities) must your caravan pass through before it arrives in Damascus? (route that is shortest in distance) according to the hebrew bible, jacobs 12 sons became a. members of the diasporab. priestsc. scribesd. the leader of israelite tribes The average cost of a compact car at a certain dealership over the last 10 years has ranged from $15,000 to $24,500. Suppose you were going to plot these points on a coordinate grid. (a) What is a good scale [range] would be good to use for the y-axis to make a nicely sized graph? Explain your reasoning. (b) What is a good interval [step size] would be good to use for the y-axis to make a nicely sized graph? Explain your reasoning. (c) What is a good scale [range] would be good to use for the x-axis to make a nicely sized graph? Explain your reasoning. (d) What is a good interval [step size] would be good to use for the x-axis to make a nicely sized graph? Explain your reasoning. Note: The step size the distance between the marks on the graph, and the range is the maximum and minimum values (ex: -10 to 10). 23.79 divided by 3 estimate Major World RiversNileEuphratesIndusHuangWhat did these rivers have in common?A. They were used to irrigate large rice fields.B. They had many shallow rapids.C. They were the locations of early civilizations.D. They were rich in mineral deposits. Which is the IUPAC name for NO?nitric oxidebinitrogen oxidedinitrogen dioxidenitrogen monoxide 10: For the fermentation experiment: List the 4 reagents used and their function How did Great Britain and France place the new United States in the middle of their conflict? Express x in terms of y:3(x + 2y) = 2x = 5y Please with a cherry on top help me solve this. I will give you brainliest. Thanks. Running a campaign requires money to be successful. Imagine you are running for mayor of your hometown. How would you raise money to support your campaign? What would you spend the money on? Write in complete sentences Help, please. I will give brainliest to anyone that answers first. What are the benefits and dangers of the Iron element in our daily life?