Consider a text editor that saves a file whenever you click a save button. Suppose that when you press the button, the editor simply (1) animates the button "down" event (e.g., by coloring the button grey), (2) uses the write() system call to write your text to your file, and then (3) animates the button "up" event (e.g., by coloring the button white). What bad thing could happen if a user edits a file, saves it, and then turns off her machine by flipping the power switch (rather than shutting the machine down cleanly)

Answers

Answer 1

Answer:

The answer to this question can be defined as follows:

Explanation:

The write() method guarantees you to updates the memory of both the kernel, and may not ensure which updates were flushed through stable storage. Unless the client instead switches on either the monitor but views the file, it displays the file, to combines from older and newer versions will be shown. The very first two cases will be deemed "bad" because the user probably can not expect them after completing the save.

Related Questions

You are a technician working for a large company and you notice a user has left a Post-it note attached to her monitor of a new password that she was just given. What should the technician do

Answers

Explanation:

When you notice that  a user has left a Post-it note attached to her monitor of a new password that she was just given, you should immediately inform this to your senior authority. As this is potent sign of virus or malware threat to the system.

Common concerns with backups are disk failure, lack of redundancy, and the necessity of future growth of disk capacity. Which backup method adresses these concerns and has multiple levels of use depending on how you want to prioritize features like performance, capacity, or reliability

Answers

Answer:

RAID Array

Explanation:

Backups are needed in the IT industry to take care of some harm that can affect data resulting in its lose. RAID is the acronym for Redundant Array of Independent Disks. RAID combines multiple physical disks into a large virtual disk. It has different levels which range from 0, 1, 5, 6, and 10. RAID has a high degree of optimizing the data capacity of a backup device and its different levels prioritize features like performance, capacity, and reliability.

It also accommodates the future growth of disk capacity and reduces to the minimum the risk of data loss. It is very useful in ensuring data storage.

Importance of taking correct body measurement....

Answers

Taking correct body measurements is of key importance especially to models and future models. So that they remember about the leftover weight in their body from thanksgiving , now when they take correct body measurements , they are aware and will counter such things to be better.

Your program will read in an existing text file. You want the program to terminate if the file does not exist. Which of the following indicates the correct code for the main method header? public static void main(String[] args) throws FileNotFoundException public static void main(String[] args) throws UnknownFileException public static void main(String[] args) public static void main(String[] args) throws FileMissingException

Answers

Answer:

FileNotFoundException

Explanation:

Explain motherboard in detail

Answers

Answer:

A motherboard is the main printed circuit board in general-purpose computers and other expandable systems. It holds and allows communication between many of the crucial electronic components of a system, such as the central processing unit and memory, and provides connectors for other peripherals. Unlike a backplane, a motherboard usually contains significant sub-systems, such as the central processor, the chipset's input/output and memory controllers, interface connectors, and other components integrated for general use. It also makes arithmetical operations

Explanation:

Have a nice day ;]

Answer:

motherboard is the main printed circuit board (PCB) in a computer. The motherboard is a computer’s central communications backbone connectivity point, through which all components and external peripherals connect. The large PCB of a motherboard may include 6-14 layers of fiberglass, copper connecting traces and copper planes for power and signal isolation.

The motherboard contains the connectors for attaching additional boards, such as the CPU, BIOS, memory, mass storage interfaces, serial and parallel ports, expansion slots and all the controllers that are required to control standard peripheral devices such as the display screen, keyboard, and hard drive.

Sniffer turns the NIC of a system to the promiscuous mode so that it listens to all the data transmitted on its segment. It can constantly read all information entering the computer through the NIC by decoding the information encapsulated in the data packet. Passive sniffing is one of the types of sniffing. Passive sniffing refers to:

Answers

Answer:

The right answer will be "Sniffing through a hub".

Explanation:

Packet sniffer seems to be a device that listens for transmitted data on what seems like a channel. Sniffing enables the detection of data by individual people as it has been transferred throughout a cable. Appropriate nodes are using this methodology to make a diagnosis of connection issues, or even just harmful programs to obtain confidential information, like authentication and encryption.

A company has a network printer that is utilzed by several departments. Although the printer shows online and other departments can access the printer, the accounting group is unable to print to this network printer. Which of the following would the technician use to resolve the problem?
a. The printer needs a maintenance kit repalced.
b. The TCP/IP print spooler service need to be restarted.
c. The security settings for the print spooler need to be modified to include the department.
d. Replace the network cable on the printer

Answers

Answer: c. The security settings for the print spooler need to be modified to include the department.

Explanation:

The print spooler makes Windows computer enable to interact with the printer, and to commands the printer for print jobs .

If all the other departments can access the printer,  but not the accounting group, then the technician should check the security settings for the print spooler and modify it accordingly to include the accounting group  .

Hence, the correct answer is c. The security settings for the print spooler need to be modified to include the department.

1
TIME REMAINING
01:51:06
Zubair needs to change some of the data in a table that he has created. How should he go about selecting a row in
the table?
Moun the mourn nointor in a noint hefore the text in a cell​

Answers

the answer is zubair needs to change something

CO! Oher...9
pressure
14.
large
The barometric height in a town is 65cmHg. Given that the standard atmospheric pressure
is 76cmHg and density of mercury is 13600kg/m", determine the altitude of the town. (Density of
(3mks)
air is 1.25kg/mº).​

Answers

Answer:

Altitude of the town(h1) = 1,196.8 m

Explanation:

Given:

Height of barometer(h) = 65 cm Hg = 0.65

Standard atmospheric pressure  = 76 cm Hg = 0.76

Density of mercury(Pm) = 13,600 kg/m³

Density of  air (Pa) = 1.25 kg/m³

Find:

Altitude of the town(h1)

Computation:

Pressure due column = Δp mercury column

(Pa)(h1) = (Pm)(h)

(1.25)(h1) = (13,600)(0.76-0.65)

(1.25)(h1) = 1,496

Altitude of the town(h1) = 1,196.8 m

Suppose you have a tablet with a capacity of gigabytes. For a plain text​ book, one byte typically corresponds to one character and an average page consists of 2000 characters. Assume all gigabytes are used for plain text books. a. How many pages of text can the tablet​ hold? b. How many​ 500-page books can the tablet​ hold?

Answers

Answer:

a. 17,500,000 pages

b. 35,000

Explanation:

The computation is shown below:

As we know that

[tex]1 giga\ bytes = 1 \times 10 ^ {9} bytes[/tex]

So for 35 gigabytes it would be

[tex]= 35 \times 10 ^ {9} bytes[/tex]

And it is given that there is 2,000 characters

a. So the number of text pages would be

Let us assume that

for 2,000 it would be 1 page

So for [tex]35 \times 10 ^ {9} bytes[/tex] it would be x

Now we solve the x which is equal to

[tex]= \frac {35 \times 10 ^ {9} bytes}{2,000}[/tex]

= 17,500,000 pages

b. Now for 500 pages, it would be

[tex]= \frac{17,500,000}{500}[/tex]

= 35,000

Asia pacific and Japanese sales team from cloud kicks have requested separate report folders for each region.The VP of sales needs one place to find the reports and still wants to retain visibility of the reports in each folder. What should a consultant recommended to meet this requirement.

Answers

Answer:

B) Create all new regional folders and move the reports to the respective region folder with viewer access.

Explanation:

Below are the options

A) Create grouped folders, keeping the top region folder sharing settings and limiting the sharing settings for the grouped folders for each region.

B) Create all new regional folders and move the reports to the respective region folder with viewer access.

C) Create all new regional folders and move the reports to the respective region folder with subscribe access.

D) Create subfolders, keeping the top region folder sharing settings and limiting the sharing settings for the subfolders for each region

In order to required reports at one place and also wants to retain the visibility for each folder the consultant should suggest that all new regional folders should be created and afterwards it would be moved to their relevant region folders by involving the viewer access feature so that the VP should access it anytime

Hence, the correct option is B.

Based on the information given, the correct option will be B. Create all new regional folders and move the reports to the respective region folder with viewer access.

From the information given, it was stated that the VP of sales needs one place to find the reports and still wants to retain visibility of the reports in each folder.

Therefore, it's important to create all new regional folders and move the reports to the respective region folder with viewer access.

Learn more about folders on:

https://brainly.com/question/20262915

BP measuring machine is an example of __________

A)Computing device
B)Medical device
C)Embedded machine
D)None of these​

Answers

Answer:

I think it is a Medical device.

BP = blood pressure

Explanation:

Given the variable ip, already declared as a pointer to an integer, write the code to dynamically allocate memory for a single integer value, assign the resulting pointer to ip, and initialize the integer value to 27.

Answers

Answer:

In C++:

int *ip;

ip = new int;

*ip = 27;

Explanation:

First of all, let us have a look at the methods of memory allocation to a variable.

1. Compile Time: The memory gets allocated to the variable at the time of compilation of code only. It is also called static allocation of memory.

Code example:

int a = 5;

2. Run Time: The memory is allocated to the variable on the fly i.e. during the execution of the program. It is also called dynamic allocation of memory.

Now, we have to write code for a variable ip, which is an integer pointer to dynamically allocate memory for a single integer value and then initialize the integer value 27 to it.

Initializing a variable means assigning a value to variable for the first time.

Writing the code in C++ programming language:

int *ip;      // Declaring the variable ip as a pointer to an integer

ip = new int;    // Dynamically allocating memory for a single integer value

*ip = 27;   // Initializing the integer value to 27.

Do you know best way to know WiFi password which you are connected to?​

Answers

Answer:

Download a wifi password saver on playstore or appstore

Explanation:

Answer:

Ask the person who set up the wifi router.

Look behind the wifi box and there should be a small sticker that says the password.

Call the wifi provider and say you forgot your wifi password

Reset your password using your account.

RSA is a public-key cryptosystem developed by MIT professors Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman in 1977 in an effort to help ensure Internet security. RSA uses modular arithmetic and elementary number theory to do computations using two very large prime numbers. Identify the statement which is true for RC6 algorithm:________.
a) Is a variable key-size stream cipher with byte-oriented operations and is based on the use of a random permutation
b) Includes integer multiplication and the use of four 4-bit working registers
c) Is a parameterized algorithm with a variable block size, key size, and a variable number of rounds
d) Is a 64 bit block cipher that uses a key length that can vary between 32 and 448 bits

Answers

The answer is B) includes integer multiplication and the use of four 4-but working registers

Gregor installed a third stick of known-good RAM into his Core i7 system, bringing the total amount of RAM up to 3 GB. Within a few days, though, he started having random lockups and reboots, especially when doing memory intensive tasks such as gaming. What is most likely the problem

Answers

Answer:

The speed or quality was different.

Explanation:

The new ram that he installed most likely had a different rate, or was a different quality than the old ram.

An Administrator wants to make a list of all prospects who complete the Contact Us form but only wants them to be added the first time they complete the form. If a prospect is ever removed from the list, they shouldn't be able to get added back to it. What is the best way to create this type of list

Answers

Answer:

The answer to this question can be defined as follows:

Explanation:

The easiest way to build such a list is by using an algorithm rule, where the prospects who complete the form are then matched with the rule and added to the list because the developer would also like to list of the all applicants, who fill out all the contact us Application, but still only prefer to also have them added when they fill-up the form first. When an outlook is ever omitted from the list, it should not be included.

Write the steps to create labels in OpenOffice writer

Answers

1. Start up Open Office.Org.

2. Click on File >> New >> Labels.

3. In the label dialog box, click on the brand box. This will allow you to choose the type of paper that you use.

4. Select the type of document that you want. The usual standard is Avery, but feel free to explore and discover what you like.

5. Select if you want a single label, a document, and any other options. Some of the things you might want to do are:

- Create a variety of labels for folders or drawers

- Create a sheet of address labels

-  Create decorative labels

6. Click New Document. Here, you see a sheet of blank labels.

7. Create the type of format/placement that you want for your labels. Once you are happy with it, copy it to the rest of the labels.

8. Fill your labels with necessary information.

9. Print them out.

Eliza needs to share contact information with another user, but she wants to include only certain information in the

contact. What is the easiest way for her to achieve this?


A. Use the Edit Business Card dialog box to control the information included.

B. Export only select fields from the contact.

C. Save the contact as a VCF file.

D. Share your contacts foler with other user.

Answers

Answer:

A. Use the Edit Business Card dialog box to control the information included.

Explanation:

b was incorrect but A is correct on edge 2020 I did the unit test review

Using the Edit Business Card dialog box to control the information included is the easiest way for her to achieve this. Thus option A is correct.

What is information?

Knowledge acquired by study, discussion, research, or education is referred to as information. Data is, in essence, the outcome of the data analysis and interpretation process. Info is the interpretation of those elements of knowledge, whereas data is the particular measurements, figures, or diagrams.

She can do this most easily while using the Edit Business Card Combobox to modify the material included. When you get a new email, a meeting submission, or a task plea, a notification called a pc alert flashes up on your computer. Desktop Alerts are on by default.

Depending on the product on the content you get in your Outlook, a Desktop Alert may or may not display certain information. Therefore, option A is the correct option.

Learn more about information, Here:

https://brainly.com/question/13629038

#SPJ5

___________is used for drawing 3D objects in the field of Science and Engineering.

A)CAT
B)CAD
C)MRI
D)None of these​

Answers

Answer:

the answer is C mri hope this helps

Explanation:

Answer: C (MRI)

Explanation:

3D modelling Softwares are  used

There are two kind of 3-D  Modelling Software

Parametric  &  Non Parametric

Parametric - Maintain the relation between Different dimensions as defined on changing any dimension (constraint based).

non-parametric Does not have constraint ( its jike like moulding something from Sand , add any where , remove from any where).

Page No.:
Date:
Find the roots the quadratio
equation 3 x ² - 2 16 x + 2 =0.​

Answers

First plug in all of the values into the quadratic equation. -b+-sqrt(b^2-4ac)/2a to get 216+-sqrt(216^2-4(3)(2))/6 simply to get about 216+-216/6. This gets us about 0 and 72. THIS IS ESTIMATION NOT EXACT ANSWER

To see the non-printing characters in Writer press ________ + ________keys, together.

Answers

Answer:

Ctrl + *

Explanation:

Non-printing characters are the characters that are not displayed at the time of printing of an document or a spreadsheet. This is used for designing a content

The few are examples like non-breaking space, the pilcrow etc

The shortcut to show or hide the non-printing characters is Ctrl + * i.e Contorl + Star

So press these two keys we can see the non-printing characters

Answer:

Ctrl+F10, is the keys to see the non printing characters in Open Office Writer

Explanation:

You’ve just completed a survey of the wireless signals traversing the airspace in your employer’s vicinity, and you’ve found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. What kind of threat do you need to report to your boss?
A. Rogue access point
B. War driving
C. Bluesnarfing
D. Hidden node

Answers

Answer:

A. Rogue access point

Explanation:

A rogue access point is a point that is wireless and installed on a network that is safe and secure without taking any permission from a local administrative network (LAN). It could be done by an employee or a person who is a malicious attacker

Therefore according to the given situation, since there is an unauthorized AP i.e too strong which is mid of 100-acre campus so it would be a threat of Rogue access point and the same is to be communicated to the boss

What is the port representing buy above symbol?

Answers

Answer:The port representing buy above symbol used in thousands used symbols by computer represent a today.

Explanation:The computer symbol is used to representing a today function,company, warning,specification.Symbol is used to the computer and electronics with each description.

Most symbols are shown below not may match your hardware device and software program.There are many types of symbol :

(1)Keyboard symbol (2)Display symbol (3)Power symbols (4)Sound symbols

(5)E-mail symbol (6)General symbol (7) Drive symbol (8) Network symbol

Symbol is the most commonly full circle and vertical at the top the power.

If you have a 3D printer please show me a vid of you making something because I'm interested in getting one. Ty! Also can someone show me how to put more points in a question that I ask on Brainly?

Answers

Explanation:

Too add more points on your brainly question(phone), type your question

Then, see on your top left, you can see the points. It will show 10,which means you have to lose 10 points which is the minimum points for one question. If you are generous to give more points, click on it the you can scroll till the maximum point which is 100..but each points you give will divide 2.

For example, you just loose 10 points for your question but I only got 5 points

Hope you understand this

I'm not sure with laptop

HAVE A GOOD DAY!

Write a pseudocode algorithm which inputs numeric scores and outputs how many of them are over 100. The end of the data is signalled by a user input of -1.

Answers

Answer:

calculateCountGreaterThan100()

{

declare variable count with zero

while True

 {

 input numeric values from user

 if user inputted value > 100

  increment the count

 if user inputted value == -1

  break the loop

 }

print the value of count

}

Explanation:

First of all, let us have a look at the meaning of a pseudocode:

A pseudocode is nothing but a informative way of expressing our code in simple plain English.

It is not written in programming language so it does not have any syntax rules.

Here, we are asked to write pseudocode algorithm for inputting numeric scores and output the number how many of them are greater than 100. The end of numbers is signalled by a user input of -1.

The answer is:

calculateCountGreaterThan100()

{

declare variable count with zero

while True

 {

 input numeric values from user

 if user inputted value > 100

  increment the count

 if user inputted value == -1

  break the loop

 }

print the value of count

}

Here, we have declared a variable with initial count as 0.

Then, in a loop we are taking input from user in which user is giving integer input.

If the value is greater then zero, the count is incremented.

If the value is -1, we come out of the loop and then print the count value.

Pseudocode algorithm are algorithms that are implemented using pseudocodes, and it does not obey the syntax of a programming language.

The Pseudocode algorithm

The pseudocode algorithm is as follows:

count = 0

input num

while num != -1:

    if num > 100:

         count++

print(count)

The flow

The flow of the above pseudocode algorithm is as follows

First, variable count is initialized to 0Next, we take input for numNext, a loop is repeated until the input is -1During each loop, the inputs over 100 are countedLastly, the count of inputs greater than 100 is printed

Read more about pseudocode algorithm at:

https://brainly.com/question/11623795

The preferred means of creating multithreaded Java applications is by implementing the ________ interface. An object of a class that implements this interface represents a task to perform.

Answers

Answer:

Runnable.

Explanation:

Java is an all round programming language which is typically object-oriented and class-based. It was designed by James Gosling, developed by Sun microsystems and released officially on the 23rd of May, 1995. Java programming language is designed to have only a few implementation dependencies as possible because it was intended to be written once, and run on any platform.

Java makes concurrency to be available to software developers through the application programming interface (API) and the language. Also, it supports multiple threads of execution, by making each thread have its respective program counter and method-call stack, which then allow concurrent executions with other threads.

The preferred means of creating multithreaded Java applications is by implementing the runnable interface. An object of a class that implements this interface represents a task to perform. The code is public void run ().

A user reports that he cleared a paper jam and now cannot print. The technician reseats the paper and then prints a test page from the printer. A test page sent from the workstation does not print. Which of the following actions should the technician take first?
a. Check the printer connection
b. Stop and start the printer
c. Reboot the computer
d. Clear the print queue

Answers

Answer:

d. Clear the print queue.

Explanation:

If a user reports that he cleared a paper jam and now cannot print. Also, the technician reseats the paper and then prints a test page from the printer. A test page sent from the workstation does not print. The first and most appropriate action the technician should take is to clear the print queue.

In computer technology, a printer is an electronic output device (peripheral) that is used for the printing of paper documents (texts and images).

The print queue is the directory or location where the printing sequence for a printer is stored or backed up. If it was ensured that the power cord of the printer is properly plugged in, the paper jam is cleared and the papers are properly seated, then the next action to take is clearing the printing queue. Once, the printing queue is cleared and becomes empty, the printer will begin to print.

why is know app downloading in my android phone even if I have 900 MB ???

Answers

Answer:

May be you have not signed in with Google

Perhaps you are stopping the downloading without knowing

A flat-panel detector is exposed with nothing between the x-ray tube and detector. 5 images were acquired on 5 different days using the same exposure. The pixel readings within a region of interest (ROI) are compared. What quality control test was performed?
a. Detectability
b. Linearity
c. Repeatability
d. Uniformity

Answers

Answer:

c. Repeatability

Explanation:

Since in the question it is mentioned that the falt panel detects the relation between the x-ray tube and detector. Also five images were purchased on five different days but used the similar exposure

So for the quality control test, the repeatability should be performed as the reading of the pixel is done within a region of interest also it examines the consistency of the pixel reading over time

Hence, the correct option is c.  

Other Questions
Stitches Corporation enters into a contract to sell denim clothing to Trend Fashion Company, which in turn sells the clothing to consumers. In contrast to standards that apply to consumers, the UCC imposes on merchants:_________ a. less strict legal standards. b. special business standards. c. stricter ethical standards. d. the same overall standards. Please help with 4.)WILL MARK BRAINLIEST X Explain how a POLAR climate impacts culture The slope intercept form of a line isy=mx+bThe slope is represented by____The y-intercept is represented by____ (952.695) + 0.00195 5.382 please help Thank you to whoever helps HELP FAST PLEASE Polygon ABCDE is congruent to polygon TVSRK. VSR corresponds toa,) b,) c,) d,) 1/3 x =6 What would like match this answer What doesthe painting show aboutLafayette's relationship withWashington? HELP MAJOR ASSIGNMENT PLEASE HELP pls? Help please!! Thanks!!! Suppose the MPC is 0.60. Assume there are no crowding out or investment accelerator effects. If the government increases expenditures by $200 billion, then by how much does aggregate demand shift to the right True or false : In improper integrals infinte intervals mean that both of the integration limits are should be infinity The hypotnuse of a right triangle is three times the length of its first leg. Theblength of the other leg is four feet. Find the lengths of the first leg and the hypotnduse and enter them in the below squares in this order. For non-integer answer(s), round your answer(s) to the nearest tenth. area of parallelogramis 30 cm^2. if the length of two adjacent sides are 6 cm and 10 cm respectively. find its diagonal Need help with this, I dont need an explanation. Find the difference of functions at x= - 3, (g - f)(-3), given f(x) and g(x): g(x) = x^215, and f(x) =2x When Jones Foods decided to enter Germany, a highly developed market, it found that it competed with hundreds of brands. In terms of communication strategy, in highly developed countries such as Germany which is typically true g Increasing the number of unsaturations in a fatty acid ____________ the melting temperature of the fatty acid. The Karaoke Channel Online streams professional-grade karaoke for $9.95 a month. Suppose Karaoke Channel Online has a constant marginal cost of $1 per customer and total fixed cost is $20,000. The profit maximizing number of customers is 10,000. Several competitors start to advertise online. Karaoke Channel Online now spends $5,000 a month on advertising and the profit maximizing number of customers increases to 12,000 and the streaming price remains constant. What is Karaoke Channel Online's total profit after the advertising begins? A collection of 108 coins containing only quarters and nickels is worth $21. A table titled Coin Collection showing Number of Coins, Value, and Total. The first row shows Nickels, and has n, 0.05, and 0.05 n. The second row shows, Quarters, and has q, 0.25, and 0.25 q. The third row shows total, and has not entries. Which value could replace q on the chart? 21 108 21 n 108 n