Suppose a thread is running in a critical section of code, meaning that it has acquired all the locks through proper arbitration. Can it get context switched out? (2 pts)
Why or why not? (5 pts)
What happens when a thread is interrupted? (5 pts) Are there any conditions under which interrupts are ignored? (5 pts)

Answers

Answer 1

Yes, a thread running in a critical section of code can get context switched out.

This is because while the thread has acquired all the necessary locks through proper arbitration, the operating system may still interrupt the thread and switch to a different thread based on its scheduling algorithm. Even if a thread is running in a critical section of code, it is not guaranteed to run uninterrupted until it completes its task. When a thread is interrupted, it is typically paused and its context (i.e. the state of its registers and memory) is saved. The operating system then switches to another thread to execute its instructions.


Yes, a thread running in a critical section of code can be context switched out, as the operating system's scheduler may decide to switch between threads based on priority or time-slicing mechanisms.


This ensures the uninterrupted execution of essential tasks or system stability.

To know more about scheduling algorithm, click here:

https://brainly.com/question/28501187

#SPJ11


Related Questions

2.An atom is positively charged.true or false

Answers

Answer:

true

atom are positively charde

A linear representation of a hierarchical file directory is known as what?

Answers

It is known as a directory path

Answer:

C.) a directory path

Explanation:

because I got it right.

what is the definition of a computing device ​

Answers

Answer:

Any electronic equipment controlled by a CPU, including desktop and laptop computers, smartphones and tablets. It usually refers to a general-purpose device that can accept software for many purposes in contrast with a dedicated unit of equipment such as a network switch or router.

Explanation:

hope this helps...

yeah what they said :)

What does Spam mean in tech

Answers

Answer:

Spam is digital junk mail. They are unsolicited communications sent in bulk over the internet or through any electronic messaging system. For example, when you text someone "hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi" they will tell you "stop spamming!"

Answer:

Spam means Digit Junk Mail in tech context.

Explanation:

Spam is digital junk mail: unsolicited communications sent in bulk over the internet or through any electronic messaging system. It is unsolicited bulk messages, spamming is the act of sending these messages, and a person who engages the practice is a spammer. Most of the time, spamming is commercial in nature, and though the spam is bothersome, it isn’t necessarily malicious or fraudulent (though it can be).

If you attend a regionally accredited college, your a0 will most likely always be accepted at any college.

Answers

Answer:

The credits you take at a regionally accredited college will most likely always be accepted at any college.

Attending a regionally accredited college generally increases the likelihood that academic credits will be accepted by other colleges or universities.

Academic credits are a measurement used in higher education to quantify the amount of learning or academic work completed by a student. They serve as a way to track and recognize the progress made toward completing a degree or program.

Each course or module within a degree program is assigned a specific number of credits, which represents the estimated amount of time and effort required to successfully complete the course.

Learn more about credits, here:

https://brainly.com/question/31941658

#SPJ2

(53) 10 into binary ​

Answers

Answer:

10 in binary would be written as 1010

T/F: instructions for three router network using ospf and acl router commands

Answers

False. instructions for three router network using ospf and acl router commands

Instructions for configuring a three-router network using OSPF and ACL router commands would involve configuring OSPF routing protocol and Access Control Lists (ACLs) on the routers, but it would require more than just OSPF and ACL commands. It would involve a series of configuration steps specific to the network topology and requirements.

Here is a high-level overview of the steps involved in configuring a three-router network using OSPF and ACLs:

Configure basic IP addressing on each router's interfaces.

Enable OSPF routing protocol on all routers and configure OSPF parameters such as area assignments and OSPF network types.

Establish OSPF neighbor relationships between the routers.

Configure OSPF routing information and specify which networks to advertise.

Implement Access Control Lists (ACLs) on the routers to control traffic flow based on defined criteria.

Know more about router network here:

https://brainly.com/question/14974015

#SPJ11

A security engineer analyzes network traffic flow collected from a database. The engineer uses the IP Flow Information Export (IPFIX) IETF standard as a resource for data collection, and notices a pattern in the data traffic for specific IP addresses at night. Evaluate the terminology and conclude what the IT engineer records

Answers

The security engineer is using the IPFIX standard to collect network traffic flow data from a database. They observe a consistent pattern in the data traffic involving specific IP addresses during nighttime.

IPFIX (IP Flow Information Export) is a standard defined by the IETF (Internet Engineering Task Force) that allows network devices to export information about IP flows. It provides a structured format for recording details about network traffic, such as source and destination IP addresses, protocol, port numbers, and timestamps.

In this scenario, the security engineer is leveraging IPFIX to capture and analyze network traffic flow data. They notice a recurring pattern in the data traffic associated with specific IP addresses during nighttime. This pattern could indicate suspicious or abnormal activity occurring during those hours. By examining the collected information, the engineer can investigate further and potentially identify any security threats or anomalies that require attention.

Learn more about specific IP addresses here:

https://brainly.com/question/31786810

#SPJ11

Manuel is working on a project in Visual Studio. He wants to keep this program showing on the entire desktop, but he also needs to have several other applications open so that he can research the project. ​

Answers

Answer:

d. Task View

Explanation:

Based on the scenario being described within the question it can be said that the best feature for this would be the Windows 10 task view. This is a task switcher and  virtual desktop system included in the Windows 10 operating system, and allow the individual user to quickly locate, manage, open or hide different windows/tasks. Such as having several projects open in different monitors running at the same time.

Which of the following numbers might this code generate: random.randint(1,9)?

0
10
11
1

Answers

Answer:

1

Explanation:

In Python programming language, the random.randint function is an abbreviation for random integers.

Basically, the random.randint is used for generating or creating a random integer numbers.

The syntax for this code can be written as;

A = random.randint(1,9)

Print ("Random number between 1 and 9 is % s" % (A))

Note, the numbers between 1 and 9 are 1, 2, 3, 4, 5, 6, 7, 8 and 9.

From the answer choices given (0, 1, 10 and 11), the only number that matches the requirement is 1.

Therefore, the number this code random.randint (1,9) might generate is 1.

T/F:asymmetric algorithms are more scalable than symmetric algorithms.

Answers

False. Symmetric algorithms are generally more scalable than asymmetric algorithms.

In cryptography, symmetric algorithms use the same key for both encryption and decryption. They are typically faster and more efficient when compared to asymmetric algorithms. Symmetric algorithms are well-suited for bulk data encryption and decryption operations, making them highly scalable in scenarios where large amounts of data need to be processed.

On the other hand, asymmetric algorithms (also known as public-key algorithms) use different keys for encryption and decryption. While asymmetric algorithms provide added security benefits such as key distribution and digital signatures, they are computationally more expensive and slower than symmetric algorithms. Asymmetric algorithms are commonly used for tasks like key exchange and digital certificates but are not as scalable for large-scale data encryption operations.

Therefore, the statement is false. Symmetric algorithms are generally more scalable than asymmetric algorithms.

learn more about "algorithms":- https://brainly.com/question/13902805

#SPJ11

how many bits do we need to represent a variable that can only take on the values 12, 22, 32, or 42?

Answers

To cover the highest number, 42, we want enough bits. In binary, 42 can be represented using 6 bits. To represent each of the four provided values, we therefore require at least 6 bits.

How do you define bits?

In a computer, a bit is a digital digit and represents the smallest unit of data. Only one of two possible values—0 or 1, which represent the electrical states of off or are on, respectively—can be stored in a bit. You hardly ever work using data one at a time since bits are so little.

Why is a nibble defined as four bits?

The phrase refers to being a little portion of a byte and is a pun on the word "bite." In more detail, a nibble is equal to four bits, or half of a byte. The binary coded decimal (BCD) code, during which four bits typically represents a digit among 0 and 9, and the nibble unit were created in tandem.

To know more about bits visit:

https://brainly.com/question/2545808

#SPJ4

How are computers classified into different types? Explain ​

Answers

Computers differ based on their data processing abilities. They are classified according to purpose, data handling, and functionality. ... According to data handling, computers are analog, digital, or hybrid. Analog computers work on the principle of measuring, in which the measurements obtained are translated into data.

Which of the following is NOT a responsibility of an IT project manager?

A.
writing code

B.
managing the budget

C.
managing the schedule of the project

D.
assigning work to team members

Answers

Answer:

I think that The answer is A.

Explanation:

A project manager needs to be a leader which is assigning work, managing the schedule, and manage the budget.

In the name, it says Manager.
This is how I know that.

The one that is not a responsibility of an IT project manager is writing code. The correct option is A.

What is IT project manager?

The unique IT objectives of enterprises must be planned, organized, resourced, budgeted, and successfully carried out by IT project managers. Examples of such initiatives include the creation of apps and software.

One of the most difficult occupations is project management since no day is ever the same and you must use all of your project management abilities to address every issue.

Additionally, when an issue arises, your team will turn to you first. They might assume you have all the solutions to their questions. A project manager must be a leader who manages the budget, schedule, and job assignments.

Therefore, the correct option is A. writing code.

To learn more about IT project managers, refer to the link:

https://brainly.com/question/15404120

#SPJ2

A binary one-to-many (1:N) relationship in an E-R diagram is represented by adding the primary key attribute (or attributes) of the entity on the one side of the relationship as a(n) ________ in the relation that is on the many side of the relationship.
Unique key
Foreign key
Primary key
Index

Answers

A binary one-to-many (1:N) relationship in an E-R diagram is represented by adding the primary key attribute (or attributes) of the entity on the one side of the relationship as a foreign key in the relation that is on the many side of the relationship. Option B is asnwer.

In an E-R (Entity-Relationship) diagram, a binary one-to-many relationship occurs when one entity is associated with multiple instances of another entity. To represent this relationship, the primary key attribute(s) of the entity on the one side are added as a foreign key in the relation on the many side.

This foreign key establishes a connection between the two entities, ensuring that each instance on the many side is linked to the corresponding instance on the one side. The foreign key acts as a reference to the primary key of the related entity, allowing for data consistency and integrity.

Option B is asnwer.

You can learn more about foreign key at

https://brainly.com/question/13437799

#SPJ11

TRUE OR FALSE - SQL language is used to query data in a Relational Database?

Answers

Answer:

Yes I agree with the other person who answered that

May I ask, when you accidently drop your laptop into a pool,...(water) . Will the Data and Many other information... inside the laptop gone?

Answers

Not necessarily, you should try getting it fixed

Answer:

no

Explanation:

when its being repaired you will get all your information back. Unless you drop it in fire or your hard disk get crushed or formatted

1.what are the ways on how to maintain you hand tools properly?

2.why is it important to have proper maintenance of hand tools?


3.why do you think 5s is important in the workplace?


help:(

Answers

There are several ways to maintain your hand tools properly. Store them in a safe and organized manner, and regularly inspect them for any damage or wear and tear. Cleaning your hand tools after use helps prevent rust and corrosion, which can lead to deterioration and eventually make them unusable.

Proper maintenance of hand tools is important for several reasons. It prolongs their lifespan and ensures they function properly, which saves you time and money in the long run. Explanation-wise, when hand tools are well-maintained, they are less likely to break or malfunction, which can cause delays or accidents in the workplace. Additionally, having to constantly replace broken or worn-out tools can be costly and time-consuming, so proper maintenance is a smart investment.

5S is important in the workplace for several reasons. It promotes safety, efficiency, and productivity by organizing the workplace and reducing waste. 5S involves five steps: sorting, straightening, shining, standardizing, and sustaining. By sorting through materials and equipment and getting rid of anything that is not necessary, the workplace becomes safer and more efficient. Straightening involves organizing everything in a logical and accessible manner, which makes it easier to find and use tools. Shining refers to keeping everything clean and in good condition, which helps prevent accidents and prolongs the lifespan of equipment.

To know more about inspect visit:-

https://brainly.com/question/30727643

#SPJ11

the locations of the various indexed variables in an array can be spread out all over the memory. group of answer choices true false

Answers

It is false that the locations of the various indexed variables in an array can be spread out all over the memory.

In an array, the locations of the various indexed variables are not spread out all over the memory. Instead, the elements of an array are stored in contiguous memory locations. This means that the memory addresses of consecutive array elements are adjacent to each other.

The concept of contiguous memory allocation is fundamental to arrays. It allows for efficient and direct access to array elements using their indices. The memory addresses are calculated based on the starting address of the array and the size of each element.

For example, in C/C++, if you have an array of integers, the memory locations of the array elements will be consecutive, with each integer taking up a fixed amount of memory (typically 4 bytes). Accessing an element in the array is achieved by calculating the memory address of the desired element based on its index.

Therefore, the elements of an array are stored contiguously in memory, ensuring efficient access and predictable memory addressing.

To know more about array, visit:

brainly.com/question/13261246

#SPJ11

que es la felicidad??​

Answers

Se feliz el amor es nada

Debes llegar a la escuela a las 6:40 am, a qué hora necesitas levantarte para realizar todo lo necesario y llegar a tiempo a la escuela sin que ningún imprevisto te sorprenda.

Answers

Si debiese llegar a la escuela a las 6:40, el horario en que debería levantarme para realizar todo lo necesario y llegar a tiempo a la escuela sin que ningún imprevisto me sorprenda dependería de la distancia a la cual viviese de la escuela.

Ahora bien, en condiciones normales, un alumno debería vivir a una distancia promedio de 1 km a 1.5 km de la escuela, con lo cual, idealmente, debería levantarse una hora antes (a las 5:40) para desayunar, cambiarse, preparar sus materiales y llegar a la escuela a tiempo.

Aprende más en https://brainly.com/question/21026365

Can someone do this for me before 11:59 thanks in advance




How we hear

Here is someone listening to some music produced by the loudspeaker and CD player

Please explain how the person hears the music

Can someone do this for me before 11:59 thanks in advance How we hearHere is someone listening to some

Answers

The person hears the music because of the vibrations coming out off the speaker and CD player. The vibrations come in different size wavelengths which then lead/flow to our eardrums and to our brains which signals us to recognize what the sound is, causing us to be able to hear it.

sarah was recently reviewing all the photos that she has saved on her computer and was shocked to find that she has over 10,000 images. thankfully, digital photography will allow her to rearrange, organize, and easily search within her photos. what types of tasks are these?

Answers

The types of tasks that enabled Sarah to rearrange, organize, and easily search within her photos is generally referred to as: D. image management.

What is image management?

In Computer technology, image management can be defined as a type of technological feature that avails an end user an ability to store, rearrange, organize, search, and distribute digital images, documents, and graphic designs that are stored automatically on a computer system.

Additionally, image management can be used by an end user to manage, evaluate, and sort images (photos) based on the perception of people.

Read more on image management here: https://brainly.com/question/25756717

#SPJ1

Complete Question:

Sarah was recently reviewing all the photos that she has saved on her computer and was shocked to find that she has over 10,000 images. Thankfully, digital photography will allow her to rearrange, organize, and easily search within her photos. What types of tasks are these?

A. image evolution

B. image formatting

C. image editing

D. image management

configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.

Answers

Configuring a firewall to ignore all incoming packets that request access to a specific port is known as logical port blocking.

Why do ports get blocked? A setting that instructs a firewall to reject any incoming packets that ask for access to a specific port, preventing any unauthorized requests from reaching the machine.The technique of an Internet Service Provider (ISP) recognizing and completely blocking Internet traffic based on its port number and transport protocol is known as "port blocking."If there are appropriate options available for stopping undesirable traffic and protecting customers, ISPs should refrain from port blocking.Additionally, if port blocking is deemed required, it should only be applied to safeguard the network and users of the ISP doing the blocking.A logical port is one that has been programmed.A logical port's function is to enable the receiving device to determine which service or application the data is intended for.

To learn more about logical port blocking refer

https://brainly.com/question/6275974

#SPJ4

how long did it take a computer in 1949 to compute 2037 digits of pi?

Answers

In 1949, the first stored-program computer, the Manchester Mark I, was operational. It had a clock speed of about 1 MHz, and each arithmetic operation took several microseconds to complete.

Computing 2037 digits of pi would require a significant amount of computation, even with a dedicated algorithm for calculating pi.

In fact, it would have been practically impossible to compute 2037 digits of pi on a computer in 1949. At that time, the most accurate value of pi was known to be about 3.1416, which had been calculated by hand and with the use of mechanical calculators. The first electronic computer to calculate pi to 2,037 decimal places was the CDC 6600 in 1966, and it took several hours to complete the calculation.

Therefore, the question of how long it would have taken a computer in 1949 to compute 2037 digits of pi is not answerable, as it would have been beyond the capabilities of the computers available at that time.

To know more about first stored-program computer, visit: brainly.com/question/29314719

#SPJ4

1) Using the topics below, in 150 words or more for each item, describes how Threat Modeling fits into each:
a) System development life cycle.
b) Software development life cycle (address software development and not system items).
c) Security maturity.
d) Security plan and policies.

Answers

Threat modeling can be described as the method of analyzing a software system or application in order to identify and address any potential security threats and vulnerabilities. This analysis takes into account the components and structure of the system, as well as the external environment in which it will operate. Threat modeling is a crucial aspect of secure software development and can be integrated into various stages of the system development life cycle (SDLC), software development life cycle (SDLC), security maturity, and security plan and policies.

a) System development life cycle: Threat modeling can be integrated into the system development life cycle in several stages, including the design and implementation phase. At this stage, the threat model will help developers identify potential threats and vulnerabilities and ensure that they are addressed early on in the development process. This will help to prevent security issues from being introduced into the system later on and ultimately save time and resources in the long run.

b) Software development life cycle: Threat modeling can be integrated into the software development life cycle by addressing software development and not system items. At the coding stage, developers can use the threat model to help identify potential security vulnerabilities and ensure that they are addressed before the code is deployed. This can help prevent common security issues like SQL injection, cross-site scripting, and other types of attacks.

c) Security maturity: Threat modeling is a critical aspect of security maturity. By using threat modeling, organizations can develop a more comprehensive security strategy that takes into account potential threats and vulnerabilities and addresses them before they can be exploited by attackers. A mature security posture includes a proactive approach to identifying and addressing potential security risks and the use of tools like threat modeling can help organizations achieve this.

d) Security plan and policies: Threat modeling can be used to inform security plans and policies by identifying potential threats and vulnerabilities that need to be addressed. This information can then be used to develop policies and procedures that will help to mitigate these risks and ensure that the system is secure. Threat modeling can also be used to ensure that policies and procedures are effective by identifying potential gaps or areas for improvement. Overall, threat modeling is an essential component of developing effective security plans and policies.

Learn more about System development life cycle here:

https://brainly.com/question/19977141

#SPJ11

When you have completed your document review in Print Preview, you have the option to save your document as a new file type. What file type can be created using Print?

A. .com
B. .jpeg
C. .exe
D. .pdf

Answers

The file type is D) .pdf

Which class requires campers to work in teams to create a
project?

Answers

Answer:

Summer camp?

Explanation:

the area where a computer stores data and information.

First electromechanical computer.

Computer that provides the best features of analog and digital computer.

A collection of unorganized facts which can include words,numbers,images and sounds

a computer program that controls a particular type of device attached to a computer

PLEASE ANS THIS ONLY ONE WORD ANSWER ​

Answers

Answer:

generation the computer

ways you will use to reach all pupils who are living at a

disadvantaged area

Answers

Answer:

?

im confused

Explanation:

Other Questions
hey geomatry kinda confused need help thanks!! A 60 kg woman and an 85 kg man stand 9.0 m apart on frictionless ice.(a) How far from the woman is their CM?(b) If each holds one end of a rope, and the man pulls on the rope so that he moves 1.1 m, how far from the woman will he be now?(c) How far will the man have moved when he collides with the woman? what is the difference between a steady-state simulation and a terminating simulation? For the linear function f (x) = mx + b, f (-3) = 23 and f (2) = -7. Find m and b. First, address whether you agree with thestatement that "religion is a product of place". What does thismean to you? How does geography define "place"? Explain youranswer. A straight 0.75 m long conductor has 3.75 Acurrent travelling toward the East. Earth'smagnetic field in this location is 3.5 x10^-6 T[N]. What is the magnetic field force on thewire? SOLVE U 2u - 2/3 = - 3/4u+3U = what is an equation of the line that passes through the points (2,-5) and (-3,-5)? Analyze this timeline illustrating one period of the modern era:1500s-1700s European states establish colonies to act as marketsfor manufactured goodsCompany founded to financeBetish colonial expeditions1763 James Wat develops an advancedsteam engine fueling the Industrial Revolution1776 Adam Smith describes the basic ideas1848 Karl Mars oricios capitalism and promotescommunism in The CommWhich theme does the timeline most reflect?Interactions between humans and the environmentB. The creation and expansion of economic systemsC. The transformation of social structuresD. Cultural development and exchange The brain changes which contribute to addiction occur in parts of the brain called the;. There are other equally good substitutes for exercise. True False Nueva Company reported the following pretax data for its first year of operations. Net sales 7,600 Cost of goods available for sale 5,920 Operating expenses 1,793 Effective tax rate 20 % Ending inventories: If LIFO is elected 683 If FIFO is elected 863 What is Nueva's net income if it elects LIFO PLEASE ANSWER FOR BRANIEST Alex wants to grow some flowers for his wife, but isn't sure which flowers will grow best in the soil in their yard. He goes to Lowe's and buys hydrangeas, roses, daisies, and tulips. He sections off the soil into four equal parts and plants each type of flower in their own section. All flowers receive the same amount of sunlight throughout the day and he waters them all the same amount and at the same time daily. He records the growth of the flowers once a week for a month.I need to know the dependant and independent variables, constants, control group, and experimental group! The Night Thoreau Spent In Jail : 1) - importance of nature - non-conformity- self- reliance - activism name one theme found in act 1 along with textual evidence for support. Answer in 2-3 complete sentences with an in-text citation. 2) why does Bailey think that Henry is a murder? a) because henry can spell his nameb) because henry is a non-conformistc) because henry sounds educated 3) Henry used a meadow and not a textbook to teach his students about science. How does this represent Transcendentalism and would you want to learn this way? complete in 2-4 sentences4) why does Henry resign from the school he taught for? Answer in 2-3 complete sentences along with textual evidence and an in-text citation.5) Why didn't Henry pay his poll tax in this instance? Answer in 2-3 complete sentences.6) why isn't Waldo in jail and how did this make henry feel ? Assignment: Complete Parts A-D for the following poemA. Read the Poem: "Those Winter Sundays" by Robert Hayden"Those Winter Sundays" BY ROBERT HAYDENSundays too my father got up earlyand put his clothes on in the blueblack cold,then with cracked hands that achedfrom labor in the weekday weather madebanked fires blaze. No one ever thanked him.Id wake and hear the cold splintering, breaking.When the rooms were warm, hed call,and slowly I would rise and dress,fearing the chronic angers of that house,Speaking indifferently to him,who had driven out the coldand polished my good shoes as well.What did I know, what did I knowof loves austere and lonely offices?_______________________________________________________________________________________B. Poem Analysis Structure: Answer each question below.-How many stanzas?-How many lines in each stanza?-How is each stanza different from the others?-What is the title of the poem, what does it make you think the poem might be about?-Does the poem rhyme?-Is it end rhyme, slant rhyme, or internal rhyme?-What is the rhyme scheme?-Sound Devices? (Onomatopoeia, Repetition, Alliteration, Assonance, etc.)____________________________________________________________________________________________Poetic Devices: Answer each question and give an example(s) if it has that poetic device.-Similes/Metaphors?-Imagery?-Hyperbole or Personification?-Allusions, and what other work do they refer to?________________________________________________________________________________________C. Poem Discussion Questions- Answer each question in 2-3 sentences-Theme (What is love according to the poet?):-Tone? (How has the Author's Attitude of their father changed from childhood to adulthood?)-Impact of Devices on Theme (How do the poetic devices enhance the message?):- How does the imagery in the poem make the reader feel about what the parent is doing?-What other poetic devices does the poem use? How would the poem be different without them? Right triangle PQR has acute angles P and Qmeasuring 45. Leg PR measures 5/10. (You maywant to draw the triangle in your answer.) What do climate scientists predict will be the result of shifting patterns of precipitation caused by anthropogenic global warming Electric charge can accumulate on an airplane in flight. You may have observed needle-shaped metal extensions on the wing tips and tail of an airplane. Their purpose is to allow charge to leak off before much of it accumulates. The electric field around the needle is much larger than the field around the body of the airplane and, can become large enough to produce dielectric breakdown of the air, discharging the airplane. To model this process, assume that two charged spherical conductors are connected by a long conducting wire and a charge of 33.0 muC is placed on the combination. One sphere, representing the body of the airplane, has a radius of 6.00 cm, and the other, representing the tip of the needle, has a radius of 2.00 cm. What is the electric potential of each sphere? r = 6.00 cm V r = 2.00cm V What is the electric field at the surface of each sphere? r = 6.00 cm V/m r = 2.00 cm V/m 3 less than or equal to p/12 In an inverted sentence, put the predicate before the _________.subjectverbadjectiveconjunctionpreposition