Operating system manages hardware and software of a computer.

Answers

Answer 1

Answer:

OK

Explanation:

Please give me brainliest and thank me

Answer 2

Answer:

well for me I think it's

Explanation:

true because that's one of it's properties


Related Questions

You have a network that occupies the top floor of a three-story building. The WAN service provider has installed the line for the WAN service in a wiring closet on the main floor. What would you use to relocate the WAN line into a wiring closet on your floor

Answers

Answer:

Demarc Extension.

Explanation:

In this scenario, you have a network that occupies the top floor of a three-story building. The wide area network (WAN) service provider has installed the line for the WAN service in a wiring closet on the main floor.

Hence, you would use the Demarc Extension to relocate the WAN line into a wiring closet on your floor.

A Demarc Extension refers to a cabling channel or transmission path which typically originates from the interface of an internet service provider known as demarcation point to the termination point present at the premises of the end users, usually far from the minimum point of entry (MPOE).

Which step in the software development life cycle involves making improvements based on user feedback?
Coding
Design
Maintenance
Testing

Answers

Answer:

The step is Testing oki doki

Answer:

Maintenance

Explanation:

Maintenance

This primarily involves updating and making improvements based on user feedback, as well as resolving any defects that are found.

SOMEONE PLEASE HELP ME PLEASE HELP ME OUT WITH THIS!!!!!!!

Answers

Answer: Brainstorm

Explanation:

In what type of attack does the attacker have the ciphertext of several messages that were encrypted with the same encryption algorithm, but has no access to the plaintext so he or she must try to calculate the key used to encrypt the data

Answers

in ciphertext-only.

EXPLANATION: it is an attack model for cryptanalysis where the attacker is assumed to have access only to a set of ciphertexts. The attack is completely successful if the corresponding plaintexts can be extracted or, even better, the key.

15 points and brainliest if correct! :D

Complete the following sentence.
______ is an essential skill in order to decipher the massive amount of new information for any job dealing with data.

Answers

Technology I think (this is so I can answer this)
Technology I think it is

computer technology has changed our lives write of a least five ways to show how this is so​

Answers

Making it easier for different tasks
Made our lives faster
Made our lives better
Made our lives more fun
It’s easier for us to finish things faster in our everyday lives (I repeated one)

looking from behind a person at a subject is called what?

Answers

Answer:

Point of View Shot

Explanation:

In photography

Define data, information and the relation between the two?

Answers

Answer:

Program data is a type of information that a computer processes or retains. This data can be in the context of text records, photographs, etc.

Explanation:

In a particular context, information is a collected from different source, structured data provided which is beneficial to society. Data is a core objectives containing raw material which carries no special significance. Info is a collection of facts that bears a logical sense collectively.

PLEASE SOMEONE PLEASE HELP ME OUT!!!!

Answers

Answer:   Ideate

Explanation:

Answer:

the 1st one

Explanation:

According to Albert Einstein, our very existence is inextricably linked to bees - he is reputed to have said: "If the bee disappears off the surface of the globe, then man would only have four years of life left."
a.
Humans only have 4 years left to live.
c.
Human existence is dependent on bees.
b.
Bees are dependent on human existence
d.
None of the above

Answers

i’m pretty sure it’s c because they r the most important pollinator of crops
C (useless words here)

A tree topology is a combination of
topology and
topology.

Answers

Answer:

Tree topology is a combination of star and bus topology. This topology is mostly used on larger networks. It is the best topology cuz the signals that are transmitted by the root nodes are received by all the computers at the same time.

How many different messages can I convey if I use 2 light bulbs and each one stays either on or off?
4
3
6
2

Answers

3 I just did this ykkk

Answer:

4

Explanation:

1st: on on

2nd: on off

3rd: off on

4th: off off

what is impact printer​

Answers

Answer:

An impact printer is a type of printer that works by direct contact of an ink ribbon with paper

Explanation:

Select the correct answer.
David is creating an app that is optimized for a 4.7-inch screen. Which size category will he use when developing the app?
A.
xlarge
B.
large
C.
normal
D.
small

Answers

Answer:

large

Explanation:

differentiate between refraction of light and reflection of light

Answers

Refraction represents a change in the direction of propagation when beams of light encounter a medium with a different density.

Reflection is the return of light to the medium it came from when it encounters a mirror.

Reflection is the bouncing back of light when it strikes the smooth surface. Refraction is the bending of light when it travels from one medium to another .

Brendan needs to edit all the slides in a presentation by adding a company logo and a header and footer. Which is
the easiest method for doing this?
Edit the Slide Master.
Edit the Notes Master.
Use the Format Painter option.
Creating an additional slide layout.

ITS C

Answers

Answer:

should be slide master

Explanation:

computers

what is definition of LAN network?​

Answers

A local area network is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building

What three actions happen when you cloak a folder or file?

Answers

Answer:

A three actions happen when you cloak a folder or file is explained below in details.

Explanation:

You can cloak data and folders on the forgotten or local site. Cloaking eliminates cloaked data and folders from the subsequent actions:

Presenting Get, Check-In, and Check-Out executions

Producing reports

Getting newer local and newer forgotten files

Accomplishing sitewide executions, such as monitoring and modifying links

Synchronizing

Working with Asset panel contents

Refreshing templates and libraries

Which of these statements would create a variable but not assign anything to it?
variable = empty
variable = null
create variable
variable = “”

Answers

Answer:

variable = null

Explanation:

that one would fasho

Answer:

variable = null

Explanation:

What symbol must be used at the end of an if statement?
:
.
#

Answers

Answer:

period thats the answer .

Explanation:

2nd one

the answer is d i think

what is a computer class from 8​

Answers

Explanation:

computer is an electronic machine which category write in computer data

What's not an computer characteristic ??

Answers

Answer:

A computer is an electrical machine

The computer cannot think at its own

The computer processes information error-free

The computer can hold data for any length of time

Explanation:

The computer is an electrical machine is not a computer characteristic option (A) a computer characteristic is correct.

What is a computer?

A computer is a digital electronic appliance that may be programmed to automatically perform a series of logical or mathematical operations. Programs are generic sequences of operations that can be carried out by modern computers. These apps give computers the capacity to carry out a broad range of tasks.

The question is incomplete.

The complete question is:

What's not a computer characteristic?

A computer is an electrical machineThe computer cannot think on its ownThe computer processes information error-freeThe computer can hold data for any length of time

As we know,

The characteristics of a computer are:

The computer is unable to think for itself.

Information is processed by the computer without error.

The computer has unlimited storage capacity for data.

Thus, the computer is an electrical machine is not a computer characteristic option (A) a computer characteristic is correct.

Learn more about computers here:

https://brainly.com/question/21080395

#SPJ2

What's a checked exception?

A
One that the Java class library already checks for, so our programs don't have to worry about checked exceptions.

B
One that the program must check because the compiler can't check it.

C
One that the compiler can check to make sure the program handles it.

D
One that the operating system checks, evaluates, and corrects.

Answers

Answer:

The answer is option A "One that the Java class library already checks for, so our programs don't have to worry about checked exceptions"

Explanation:

A checked exception is a sort of special case that should be either gotten or proclaimed in the method in which it is declared.

In the Java class chain of importance, a special case is a checked exception in the event that it acquires from java.lang.Throwable, however not from java.lang.RuntimeException or java.lang.Error. All the application or business rationale exceptions should be checked special cases.

It is conceivable that a strategy proclaims that it can toss a special case, however it doesn't. In any case, the guest needs to manage it. The checked exception announcement has a domino impact. Any strategies that will utilize the past strategy will likewise need to deal with the checked exception, etc.

So the compiler for the Java programming language checks, at gather time, that a program contains overseers for all application exceptions, by examining every method body. In the event that, by executing the method body, an exception can be tossed to the guest, that special case should be announced. How does the compiler know whether a method body can toss an exception? That is simple. Inside the method body, there are calls to different strategies; the compiler takes a gander at every one of their strategy signature, what exceptions they proclaimed to declare.

Answer:

The correct answer is C)

Explanation:

Within Java, a checked exception is one that is checked by the compiler.

When a code within a method generates a checked exception, one of two things must happen:

a) the method should take care of the exception or

b) it should indicate the exception using throws keyword.

Cheers

If the transmitting device would like for the receiving device to push currently buffered data to the application on the receiving end immediately, it would set the ____ flag.

Answers

Answer:

The right approach will be "PSH".

Explanation:

The PSH flag seems to be an acceptable solution through TCP which always encourages the submit implementation to immediately transfer data but only whenever the buffer isn't complete. The implementation helps to formulate this same flag towards true for something like the connection, as well as TCP will instantly begin transmitting the relevant information.

You are installing an updated driver for a hardware device on your system. A dialog box displays indicating that Microsoft has digitally signed the driver you are installing. What benefits does driver signing provide

Answers

Answer:

1)The driver has been tested by Microsoft

2)The driver file has not been altered

Explanation:

From the question, we are given an instance whereby I'm installing an updated driver for a hardware device on your system. A dialog box displays indicating that Microsoft has digitally signed the driver you are installing.

The benefits that this driver signing provide are;1)The driver has been tested by Microsoft

2)The driver file has not been altered

driver reffered to group of files that give room for communication between one or more hardware devices and the operating system of the computer, it is through a driver that a computer will be able to receive/send data to hardware device correctly. The device could be a printer. to digitally sign drivers by Microsoft, the drivers must be certified by Microsoft and a signature will be provided for the driver by Microsoft.

Reason Microsoft do digitally signed drivers is that during Windows device installations , digital signature is used in verification of integrity of the driver package and also the identity of the vendor can be known, window might not run a driver that is not certified by Microsoft on 64/32 bit system.

What does the National Institute of Standards and Technology do? Promotes innovation by advancing measurement standards promotes cooperation in metrology among several regions provides certifications to individuals working in the field of metrology provides mentors to individuals working in the field of metrology

Answers

Answer:

Promotes innovation by advancing measurement standards

Explanation:

The National Institute of Standards and Technology was Founded in the year 1901, this agency is a non-regulatory body that is found within the United States Department of Commerce.

The mission of this agency is the promotion of innovation and also industrial competitiveness through the advancing of measurement science, standards, and also technology in several ways that raises economic security and also brings about improvement in the quality of life.

Answer:

(D) promotes innovation by advancing measurement standards

Explanation:

10
Select all the correct answers.
Which statements are true regarding system and application software?
System software consists of only the OS and application software.
A program is a set of instructions that helps the user understand the functioning of the computer.
Ооооо
An OS acts as an interface between the hardware and the user.
Application software allows users to perform various tasks.
Disk cleaner, resource monitor, etc. are all examples of application software.
Reset
Next
Next

Answers

Answer:

Keyboard

Explanation:

l think it is the key board

Write code which creates three regular polygons with 11, 14 and 19 sides respectively. All side lengths should be 1.0. The code should then print the three shapes, one on each line.

Answers

Answer: money

Explanation:

What would be some reasons to change the default page
encoding?

Answers

Answer:

Synchronization with the document for one reason or another

What are the characteristics of the Outlook Rules Wizard? Check all that apply.
It is useful for staying organized.
Message dates can be changed.
Users can edit the rule description.
Users can move messages to folders.
It is divided into three template choices.
Messages can be divided into categories.

Answers

Answer:

acde

Explanation:

Answer:

It is useful for staying organized.

Users can edit the rule description.

Users can move messages to folders.

It is divided into three template choices.

Other Questions
Find a recent news article displaying an employee getting in trouble for lack of integrity Usually, an interest bearing account used to hold money for shortand long term goals, but never emergenciesTrue or false In what ways, if any, is it legitimate to limit voting rights? What impact does increased CO2 in the atmosphere have on marine life? Not troll! Please help, will give brainliest! Explain your answer and how you got it.Evaluate the expression 34 + 4/9w and w = - 1/2 How is 2 bit a flat character in the outsiders What is The order of the formation of Earth? Examine the system of equations. y = 4x + 8, y = 4x 1 Which statements best describe the two expressions? Check all that apply. They have different slopes. They have different y-intercepts. The substitution method results in the false statement, 8 = 1. The solution is (8, 1). There is no solution. Approximately how much energy is transferred from one step In a food chain to the next?A. 90%B. 1%C. .1%D. 10% the crucible/please helpWhich of the following events best demonstrates Mary Warren's tendencyto be easily manipulated? *O She refuses to go to bed when John Proctor orders her to.O In court, she claims that John Proctor is the devil's man.O She agrees to sew the poppet for Abigail.O She agrees to take care of the Proctor boys once Elizabeth is arrested. sry the picture is blurry ask me of want to right it out. A yathc is anchored 90 feet offshore from the base of a lighthouse. The angle of elevation from the boat to the top of the lighthouse is 26 degrees. What is nearest to the hieght of the lighthouse How was production different after the Industrial Revolution than it wasbefore?A. Before the Industrial Revolution, items were produced in cities.After the Industrial Revolution, items were produced on farms.B. Before the Industrial Revolution, workers controlled the means ofproduction. After the Industrial Revolution, governmentscontrolled the means of production.C. Before the Industrial Revolution, items were produced one at atime. After the Industrial Revolution, items were mass produced.D. Before the Industrial Revolution, items were produced by factoryowners. After the Industrial Revolution, items were produced byfactory workers. I WILL GIVE BRAINLIEST What did Confederate states believe? Check all that apply. Protective tariffs should be passed. Slavery should be preserved. States should have more power than the federal government.Businesses should receive government aid. The states should give little power to the national government. Maryse bought a jacket from the store for $90.95. Shepaid a 7% sales tax when she bought the jacket. How Much was the jacket before the sales tax? if a aluminum rod was made out of solid glass instead of solid aluminum what would happen. How did the Progressives attempt to right the wrongs committed during the Gilded Age? Wilma is tiling her bathroom with tiles that measure 1 foot along each side. The bathroom is 15 feet long and 10 feet wide. She can lay 30 tiles per hour. Which of the following can be used to find the total number of hours it will take Wilma to cover the floor with tiles? Why did the ancient Romans call the Mediterranean Seaour sea?