________ scheduling algorithms guarantee that a process’s timing constraints are always met.

a) Preemptive
b) Nonpreemptive
c) Soft real-time
d) Hard real-time


d) Hard real-time

Computer Science & Information Technology

You might also like to view...

Charging separately for procedures that are actually part of a single procedure is an example of

A) Occupational fraud B) Health care fraud C) Fraud committed for a company D) Fraud committed against a company

Computer Science & Information Technology

A(n) ____________________, like any linked text or object, displays the address of its target page on the status bar.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

If no help file is available for a particular dialog box, when you press the F1 key the ____ opens.

A. error message B. Internet C. main Help window D. log-off screen

Computer Science & Information Technology

Company XYZ has decided to make use of a cloud-based service that requires mutual, certificate- based authentication with its users. The company uses SSL- inspecting IDS at its network boundary and is concerned about the confidentiality of the mutual authentication.Which of the following model prevents the IDS from capturing credentials used to authenticate users to the new service or keys to decrypt that communication?

A. Use of OATH between the user and the service and attestation from the company domain B. Use of active directory federation between the company and the cloud-based service C. Use of smartcards that store x.509 keys, signed by a global CA D. Use of a third-party, SAML-based authentication service for attestation

Computer Science & Information Technology