PLS HELP ASAP- Select the correct text in the passage.
Which concept explained in the paragraph below means that data always remains consistent?

Specific programs have some tasks that a computer must perform in parallel with others. These tasks (such as the performance of the same set of operations on different data sets) often work in parallel clusters. In such cases, a separate thread of execution handles each separate task. You can think of a thread as a sequence of instructions that computers can manage independently.
It is possible for different threads to access the same data elements and change their values, and this can lead to an inconsistent state of information. For instance, if multiple programs access a shared variable x and change its value, the variable will not contain the correct value at the end of the programs. We can prevent such inconsistencies by using locks. A thread puts a lock on shared data, and releases this lock only after completing its operations.

Answers

Answer 1

Answer:

reread the text

Explanation:

I do it it helps

Answer 2

Answer:

A thread puts a lock on shared data, and releases this lock only after completing its operations.

The last sentance

Explanation: TRUST ME ISTG THATS THE ANSWER


Related Questions

To make a window wider, you would move the pointer until it changes to the horizontal resize shape and then

Answers

Answer:double click it .

Explanation:

You manage a Windows server that has an attached printer that is used by the Sales department. The sales manager has asked you to restrict access to the printer as follows:Sally needs to connect to a printer, print documents, and pause and resume her own print jobs.Damien needs to pause and resume documents for all users, but does not need to change printer properties.You want to assign the most restrictive permissions that meet the sales manager's requirements. What should you do

Answers

Answer:

Damien would be assign the Manage Documents permission while Sally on the other hand will be assign the permission to print.

Explanation:

Based on the information given in order for me to assign a restrictive permission that will meet the requirements of the sale manager's what I will do is for me to assign the Manage Documents permission to Damien reason been that Damien only needs to stop and resume the documents for all users in which he does not need to change the printer properties and to assign the permission to print to Sally reason been that Sally only needs to connect to a printer and to print documents in which she will then stop and resume her own print jobs.

Biodiversity explanation

Answers

the variety of life in the world or in a particular habitat or ecosystem

Which tab should you use to change the text font color in your presentation?

Answers

Answer:

The Home Tab

Explanation:

Why is it important to proofread your work even after using the Spelling and Grammar tool?

To make sure you have the correct word count
To make sure your document layout is correct
To print your document correctly
To catch mistakes the spelling and grammar check will not catch

Answers

Answer:

To catch mistakes the spelling and grammar check will not catch.

Explanation:

Grammar and spelling check is not always perfect!

It is the 4th one, to catch mistakes the spelling and grammar check will not catch.

what is priori criteria in econometric?

Answers

a priori probability refers to the likelihood of an event occurring when there is a finite amount of outcomes and each equally likely to occur. the outcomes in a priori probability are not influenced by the priori outcome.

Answer:hbvfcxzsxdfcgvhbgfds

Explanation:

what is the purpose of writing a topic sentence​

Answers

Answer:

A topic sentence must highlight the main idea of a paragraph, letting the reader know what the paragraph will be about. The topic sentence must present an idea that will unify the rest of the paragraph while relating it back to the main thesis of the paper.

Explanation:

Answer:

To summarize the main point of paragraph

Explanation:

Which of the statements below does not describe how to print a document?
O Click on Print in the system tray.
Click on Print from the dialog box,
Select Print from the File menu.
O Click on the Print icon at the top of the screen.

Answers

Answer: system tray is what carries the papers

Explanation:

Answer:

yeeeeeeer

wwww

w

w

w

w

w

w

w

Explanation:

wwww

Page
U what is a common language that computers use
to talk with one another on- a network?
a. client b. Adapter
c. protocol d. operating
System​

Answers

I think it’s protocol
The computers use a set of protocols. Therefore, the answer is C. Protocol. I hope this helps.

Mary is writing an article about the animal kingdom. She wants to place an image below the text. Which menu should Mary choose for this
purpose?
Mary needs to choose the _________
menu in order to place the text in a desired fashion around the image

Plato btw

Answers

Answer:

she needs to choose the insert menu

When an organizatin needs a program to do a very specific job, it mayhire someone to write _____ software.​

Answers

Code sofware your welcome

How many times will line 7 be executed when the following code is run?


String str = "rebellion";

int i = 0;

int j = str.length() - 1;

String result = "";

while (i < j)

{

result = str.substring(i, i + 1) + result + str.substring(j, j + 1);

i++;

j--;

}

System.out.println(result);
(Java)

Answers

Answer:

4 times

Explanation:

Required.

How many times will line 7 be executed?

Line 2 initialises i to 0

Line 3 subtracts 1 from the length of "rebellion" , the result of the subtraction is then saved in J

So:

j = 9 - 1

j = 8

From line 2 and line 3, we have that:

i = 0 and j = 8

Line 4 is an iteration that is repeated as long as i is less than j

Line 7 will be executed, for the first time as: i < j because 0 < 8

i is incremented to 1 and j is reduced to 7

Line 7 is then executed again, the second time because 1 < 7

i is incremented to 2 and j is reduced to 6

Line 7 is then executed again the third time because 2 < 6

i is incremented to 3 and j is reduced to 5

Line 7 is then executed again the fourth time because 3 < 5

i is incremented to 4 and j is reduced to 4

At this stage, line 7 will no longer be executed because I is no longer less than as 4 = 4.

Hence, number of execution is 4 times

Jorge is sending a message to Thomas but would like a copy sent to his external email address as well. Jorge does not want Thomas to see this copy that was sent.

Which mail field will Jorge use to achieve this goal?

To:
From:
CC:
BCC:

Answers

Answer:  BCC (fourth choice)

=================================================

Explanation:

CC stands for "carbon copy".

BCC stands for "blind carbon copy".

Filling out forms is a tedious process. It's even more tedious when you have to repeat yourself multiple times. Carbon copy paper technology allows you to fill out one form and have those inputted entries be copied to the layers below. In terms of email, a carbon copy (CC) email is just an email sent to more than one person. In the CC line, recipients can see who the other people are in the email chain.

In contrast, a blind carbon copy is where the recipients cannot see who is in the BCC line. This allows Jorge to send the message copy to an external address without Thomas knowing.

what stage is the most inner part of the web architecture where data such as, customer names, address, account numbers, and credit card info is the store?

Answers

Never store the card-validation code or value (three- or four-digit number printed on the front or back of a payment card used to validate card-not-present transactions). Never store the personal identification number (PIN) or PIN Block. Be sure to mask PAN whenever it is displayed.

Janet needs to flag a message for follow-up in Outlook. Which option is not a default?

Today
Tomorrow
Next Week
Next Tuesday

Answers

Answer:

Explanation:

Today

Answer:

Next tuesday.

Explanation: Its to specific

hurry i need help swear to god i will give brainliest not lying

Answers

Answer:

finding area of a circle

def area(radius):

   int(radius)

   formula = radius * radius * 3.14

   print(formula)

radius_input = int(input('Insert the radius of your circle: '))

area(radius_input)

hope this helped :D

Select the correct answer. Which type of computer application is Apple Keynote? OA. word processor O B. spreadsheet O C. presentation OD. database O E. multimedia

Answers

Answer:

Apple Keynote is presentation Software

The correct option is C

Explanation:

Now let explain each option

Word processor:

Word processor is incorrect because it is used to type text, format it add tables and figures, For example MS Word

Spread Sheet:

Spread Sheet is incorrect as it is used for calculation. Like MS Excel

Presentation:

Key tone is a presentation software. it is used to make presentation and add animation and transition to it.

Database

Database is incorrect because databases are used for storing data. Not for presentation.

Which of the following are risks to a network?
a Sending emails
b. Granting administrator access to a non-administrator
c. Opening files from unknown senders
d. Unwanted advertisements

Answers

Answer:

option  b and c are correct answers.

Explanation:

Let see each option in detail.

a) Sending email is not a risk.

b) Granting access is a problem because the other person can undermine the network

c) Unknow senders can send virus or other malicious code to corrupts you data.

d) Unwanted advertisement is not a big deal.

Answer:

Granting administrator access to a non-administrator  

 Opening files from unknown senders

Explanation:

Psst those are the answers

What is the best approach to testing a website? visit all pages to verify that they load visit every page and verify all links visit the pages with hyperlinks visit all pages that appear on the navigation menu

Answers

Answer:

B. visit every page and verify all links

Explanation:

I just took the test, and only one year late.

Answer:

THe answer s b

Explanation:

It is said that Wifi repeater is not good as a rumor

Answers

True your welcome bue

If there is a need to write code in order to help the player move through the game, which team member would create this code?

Answers

Answer:

the main programmer

Explanation:

or the person who studies the algorithm and writes the code

hence, the programmer or main programmer

A software engineer is somebody who develops, creates, maintains, tests, and evaluates software using principles of software development. The term "programmer" is sometimes used as a synonym, although it may also imply a lack of engineering degrees or abilities.

Software developers, sometimes known as software architects, collaborate closely with clients to plan and develop software. Most software engineers do not start coding, they do establish a strong foundation in programming skills in order to communicate successfully with programmers.It must cover the full software development, commencing with only an analysis of the needs and ending with the design, test, and development of the technology to suit these goals.

Therefore, the answer is "Software Engineer".

Learn more:

brainly.com/question/23661471

A specific packet journey, from your computer to a remote server, end-to-end across multiple networks, has the following link bandwidths (packet travels across each of these links, in order): 1000 Mbps, 1 Mbps, 40 Mbps, 400 Mbps, 100 Mbps, 1000 Mbps. Assuming your computer and the server can transfer data at > = 1000 Mbps (so neither device is limiting the data transfer relative to the links), how long, in seconds, will it take to transfer a 125 MB file?

Answers

Answer:

0.125 seconds

Explanation:

The formula for the time taken to transfer the file is = file size / bandwidth

Assuming the computer and server could only transfer data at the speed of 1000 Mbps or more, The time of transmission is;

= 125 MB / 1000 Mbps = 0.125 seconds.

Jordan uses a spreadsheet to keep track of how many hits each player on a baseball team has had in each game
throughout the season. For every game, each player's name appears in a column that Jordan has titled "Player."
Next to that, a column titled "Hits" shows the number of hits for each player in a single game.
What function should Jordan use to find the average number of hits per game for player A_Clemente?
O SUMIF(Hits, "A Clemente", Player)
O SUMIF(Player, "A Clemente". Hits)
O AVERAGEIF(Hits, "A Clemente", Player)
O AVERAGEIF(Player,"A_Clemente", Hits)

Answers

Answer:

AVERAGEIF(Player, "A_Clemente", Hits)

Explanation:

The AVERAGEIF function allows users to calcule the mean value of numerical columns while also Given certain constraints within a single function call. The AVERAGEIF takes in 3 arguments.

The first is a column which houses the range of the constraint we would like to apply on our function.

The second argument is the constraint itself which should reside within the values in the range defined in the first argument.

The third argument is the numerical column whose average is calculated based on the defined constraint.

Therefore, in the scenario above, Player is the column containing player names, which it's value will later be used as a constraint

"Clemente_A" the constraint, only values pertaining to Clemente_A will be defined.

Hits, the numeric column whose value is averaged based on the constraint given.

A hacker successfully modified the sale price of items purchased through your company's web site. During the investigation that followed, the security analyst has verified the web server, and the Oracle database was not compromised directly. The analyst also found no attacks that could have caused this during their log verification of the Intrusion Detection System (IDS). What is the most likely method that the attacker used to change the sale price of the items purchased

Answers

Answer:

By modifying the hidden form values that is in a local copy of the company web page

Explanation:

In a situation were the hacker successful change the price of the items he/she purchased through the web site of the company's in which the company web server as well as the company Oracle database were not compromised directly which means that the most likely method in which the attacker used to modified the sale price of the items he/she purchased was by modifying the HIDDEN FORM VALUE that was in the local copy of the company web page making it easy for the HIDDEN FORM VALUE to be vulnerable to the hacker because the hidden form value did not store the company server side information or data but only store the company software state information which is why HIDDEN FORM VALUE should not be trusted.

Below is an ERD showing the 1:M relationship between Department and Employee entity types. This relationship is modeled as a Department JSON object as:Department: deptID,deptName,deptRoom,{deptPhone},{employee: empID, empName,empPhone,{empEmail}}Where {} indicates multi-valued.Part 1: Open the mydb database we created earlier and create a new department table with two fields:documentid (as an integer field) Jsondocument (as a JSON field)And add around 3 departments and each with 2 or 3 employees.Part 2: Use SQL to answer the following questions:Q1: Select all the records in the table.Q2: List the department names with their phones.Q3: A query to show the deptName and number of employees of the department.Q4: A query to show all the employees of a department of your choice using deptName as criteria.USE MYSQL

Answers

Answer:

hi

Explanation:

What is a commonly used software access restriction for a computer system connected to other networks such as the internet?
a.Passwords
b. Firewall
c. encryption
d. biometric systems

Answers

Answer:

firewall

Explanation:

If you need to change the typeface of a document, which menu will you choose?

Answers

Format menu

Format menu is used to change typeface of a document

April is worried that she is not a "good speller" so she plans to let the spelling checker correct all her mistakes. What would be the most helpful advice for April?​

Answers

Answer:

Likely, the best option would be to use the "auto-correct" function found on Microsoft Word or Google Docs. There are other forms of spell-checking such as Grammarly or by using a dictionary.

Explanation:

They have tools meant for checking for grammatical errors and can be used to better enhance your overall writing.

This is similar to the last problem, except that the first number on a line is an ID number that identifies an account. The same ID number may appear on any number of lines. Use a Dictionary to accumulate, for each ID, the sum of all the numbers that are on all the lines with that ID number. Call the input file id_data.txt. Write an output file called ID_sums.txt. On each line of the output fille, print an ID number and the sum. Sort the lines by the numerical order of the IDs

Answers

Answer:

Following are the code to this question:

def getSum(ID):#defining a method getSum that accept an ID

   t= 0#defining a variable t

   while ID!= 0:#defining while loop to check ID not equal to 0

       t+= ID % 10# holding remainder value

       ID = ID // 10#holding quotient value

   return t#return total value

def readRecord(S):#defining a method readRecord that hold list  

   f_Read = open("idInfo.txt","r")#defining a variable f_Read to open file

   for C_ID in f_Read:#defining for loop to hold file value  

       C_ID = C_ID.replace('\n', '')#use replace method

       S[C_ID] = getSum(int(C_ID))#use list to method value

   f_Read.close()#close file

def sortRecord(ID_List, t_List):#defining a sortRecord

   for x in range(len(ID_List) - 1):#defining for loop to calculate the length of list  

       for y in range(0, len(ID_List) - x - 1):#defining for loop to calculate the length of list

           if ID_List[y] > ID_List[y+1]:#defining if block to check value is greater

               ID_List[y], ID_List[y+1] = ID_List[y+1], ID_List[y]#swap the value

               t_List[y], t_List[y+1] = t_List[y+1], t_List[y]#swap the value

def showReport(ID, t):#defining a method showReport that accept id and t

   for i in range(len(ID)):#defining for loop to hold index value

       print(ID[i]," ",t[i])#print index value

def writeRecord(ID_List, t_List):#defining a method writeRecord that accept two list

   f_Write = open("idSorted.txt","w")#defining a variable f_Write to hold store value in file

   for i in range(len(ID_List)):#defining a for loop to store value with index

       f_Write.write(ID_List[i])#hold list value

       f_Write.write(" ")    #for space

       f_Write.write(str(t_List[i]) + "\n")# add index value

   f_Write.close()#close file

def run():#defining method run

   S = {}#defining an empty list

   readRecord(S)#passing list into readRecord method

   ID_List = list(S.keys())#defining a variable that holds key value in list

   t_List = list(S.values())#defining a variable that holds values value in list

   sortRecord(ID_List, t_List)#calling a method sortRecord by passing value

   showReport(ID_List, t_List)#calling a method showReport by passing value

   writeRecord(ID_List, t_List)#calling a method writeRecord by passing value

if "run":

   run()

Output:

Please find the attached file.

Explanation:

In the above program code, 6 method getSum, readRecord, sortRecord,showReport, writeRecord, and run method is defined, in which getSum and readRecord is used a single list store value in parameters, and in other methods, it accepts two parameter to store value in key and values form and use a txt file to store and take value.    

In the run method, an empty list s is declared, that pass into the variable ID_List and t_List, and call the method, in this program two a text file "idInfo.txt" is used, that holds some value in the file, and create another file that is "idSorted.txt", in this file it stores the value in the numerical order of the ID's.

Before we can use the PS Session to remotely manage a target system, there are certain tasks we must perform, such as create exception in Firewall and enable WinRM. PowerShell has a cmdlet that can perform all of these tasks at once.
A. Start-PSRemoting.B. Enable-PSRemoting.C. Enable-PSSession.D. Get-PSRemoting.

Answers

Answer:

B. Enable-PSRemoting.

Explanation:

Powershell is a command-line interface software used in windows operating system to manage the operations of the system. It is similar to the bash terminal scripting language in Linux and has some of the command prompt features.

The PS session is used to manage remote systems connected wirelessly to the administrative system. The command used to enable this process is "Enable-PSRemoting".

Other Questions
How do you work this problem? 10x2 +25x The portion of the parabola y=4ax above the x-axis, where is form 0 to h is revolved about the x-axis. Show that the surface area generated isA=8/3a[(h+a)/-a/2]Use the result to find the value of h if the parabola y=36x when revolved about the x-axis is to have surface area 1000. Choose the odd one out & give a reason for your answer. 2/6. 4/10. 6/18. 8/24 1. what is the legislative main responsibility2. What type of power does the necessary and proper clause give to congress Select two ways that the government helped combat large industries.helping small businessescontrolling working hoursincreasing payimproving distribution AD is the angle bisector of EAB. Solve for X list at least three examples of circular motion Help pls5. Describe what occurs at mid-ocean ridgesAnswer:6. Find the Nazca plate and the South American plate. How are they different? Are they moving toward or away from each other?Answer:7. How is the Nazca plate moving in relation to the Pacific plate?Answer:8. How are convection currents in the mantle (geosphere) and in the oceans (hydrosphere) similar? How are they different?Answer: Write the unit rate for each * You score 84 points in 6 games. Why are hand gestures useful in speeches?A. Because they can minimize nervous hand shakingB. Because they can make you seem confidentC. Because they can make you seem friendlyD. Because they can help you to hide deception Find the range and the interquartile range for 28,29,33,28,27,32,30,27 Is this a function??? An 80 gram sample of a radioisotopes decayed to 40 grams in 3 days how many grams of the original sample would remain after 9 days How do you think this type of art was received at the time it was released? How do you think more traditional artists of the era felt about this piece? Nuclear fusion reactions release more energy than fission reactions while also generating less waste. However, nuclear fusion reactors are not currently used to generate electricity.What is the main reason for this? please help. I really need it. If you have five red balls and five blue balls in a jar whats the probability of the first ball being red? What does the Supremacy Clause do? Question 2 options: Declares the U.S. a super power Establishes state governments Makes state constitutions the highest law of the land Makes the U.S. Constitution the highest law of the land What affects an ecosystem more, the abiotic factors that make it up, or the communities living in to? I need help with this question.Pls help.