Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.
Login to our social questions & Answers Engine to ask questions answer people’s questions & connect with other people.
Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
Questions | Answers | Discussions | Knowledge sharing | Communities & more.
The function(s) of the Storage Assignment is (are)
The function(s) of the Storage Assignment is (are) to assign storage to all variables referenced in the source program, to assign storage to all temporary locations that are necessary for intermediate results, to assign storage to literals, and to ensure that the storage is allocate and appropriateRead more
The function(s) of the Storage Assignment is (are) to assign storage to all variables referenced in the source program, to assign storage to all temporary locations that are necessary for intermediate results, to assign storage to literals, and to ensure that the storage is allocate and appropriate locations are ..
See lessData encryption
Data encryption is a security method where information is encoded and can only be accessed or decrypted by a user with the correct encryption key. Encrypted data, also known as ciphertext, appears scrambled or unreadable to a person or entity accessing without permission.
Data encryption is a security method where information is encoded and can only be accessed or decrypted by a user with the correct encryption key. Encrypted data, also known as ciphertext, appears scrambled or unreadable to a person or entity accessing without permission.
See less. Indicate which, of the following, is not true about Nassi-Shneiderman charts
A Nassi–Shneiderman diagram (NSD) is a graphical representation of structured programming. These diagrams are also called "structograms" as they show a program's structure. They don't have a representation for a GOTO statement, which is in line with the structured programming concept to make it easiRead more
A Nassi–Shneiderman diagram (NSD) is a graphical representation of structured programming. These diagrams are also called “structograms” as they show a program’s structure. They don’t have a representation for a GOTO statement, which is in line with the structured programming concept to make it easier to understand
See lessPart of a program where the shared memory is accessed and which should be executed invisibly, is called
critical section. Part of a program where the shared memory is accessed and which should be executed invisibly, is called critical section.
critical section. Part of a program where the shared memory is accessed and which should be executed invisibly, is called critical section.
See lessThe total time to prepare a disk drive mechanism for a block of data to be read from it is
The total time to prepare a disk drive mechanism for a block of data to be read from it is latency plus seek time.
The total time to prepare a disk drive mechanism for a block of data to be read from it is latency plus seek time.
See lessSpecial software to create a job queue is called a
Hence the correct answer is Spooler.
Hence the correct answer is Spooler.
See lessIn a magnetic disk, data is recorded in a set of concentric tracks which are subdivided into
sectors Magnetic disks are structured into concentric circles known as tracks. The tracks are the fundamental unit in which the data is organized and written to or read from the magnetic disk. Each track can further be divided into sectors, which are the smallest unit that can be accessed on a disk
sectors
See lessMagnetic disks are structured into concentric circles known as tracks. The tracks are the fundamental unit in which the data is organized and written to or read from the magnetic disk. Each track can further be divided into sectors, which are the smallest unit that can be accessed on a disk
Virtual Memory
Virtual memory is a common technique used in a computer's operating system (OS). Virtual memory uses both hardware and software to enable a computer to compensate for physical memory shortages, temporarily transferring data from random access memory (RAM) to disk storage.
Virtual memory is a common technique used in a computer’s operating system (OS). Virtual memory uses both hardware and software to enable a computer to compensate for physical memory shortages, temporarily transferring data from random access memory (RAM) to disk storage.
See lessThe practice of "bundling" refers to
Bundling refers to a common marketing strategy, in which firms sell multiple goods and services in a single package or "bundle." The price for a bundle is then offered at a discount.
Bundling refers to a common marketing strategy, in which firms sell multiple goods and services in a single package or “bundle.” The price for a bundle is then offered at a discount.
See lessCan you name of the major Operating System used in computers?
The three most common operating systems for personal computers are Microsoft Windows, macOS, and Linux. Modern operating systems use a graphical user interface, or GUI (pronounced gooey).
The three most common operating systems for personal computers are Microsoft Windows, macOS, and Linux. Modern operating systems use a graphical user interface, or GUI (pronounced gooey).
See less