1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
avanturin [10]
2 years ago
11

Choose all of the items that represent functions of an operating system.

Computers and Technology
1 answer:
Lynna [10]2 years ago
6 0

Answer:

all 5

Explanation:

operating system is the software thay runs other software

brainly.com/question/18465035

You might be interested in
What is one way for an entrepreneur to decrease risk?
marysya [2.9K]

Answer

we can  decrease risk for an entrepreneur by creating a team of trusted advisors to rely on.

there are some points that we can take in mind know how  to position our company as a safe position.

revenue streams and additional technology, paving the way for future growth.

Entrepreneurs can use all these  unique strategies to decrease those risk

8 0
3 years ago
Which of the following is a hardware component used to hold the BitLocker encryption key and ensures encrypted data is not acces
Vadim26 [7]

Answer:

TPM(Trusted Platform Module) is the correct answer to the following question.

Explanation:

Because TPM is the computer chip which protects your system data and store all keys and access of data that is encrypted by these keys. So that's why TPM is that hardware component which is used to contain the encryption keys and that data is not accessible to any other person's whether your hard drive will be lost or stolen by anyone.

6 0
3 years ago
Elvis has asked Bonnie out on a date to a baseball game. Elvis is a friend of Bonnie's classmate Ginger and she has met him a fe
valentina_108 [34]
My opinion a background check and take another friend with you.
4 0
3 years ago
Read 2 more answers
In Subtractive empathy, the counselor responses gives back less (or distorts) than what the client has said. slightly add someth
SashulF [63]

Answer:

gives back less (or distorts) than what the client has said.

Explanation:

Emotional intelligence can be defined as the cognitive ability of an individual or person to be able to recognize his or her emotions, have an understanding of the message being conveyed and knowing how these emotions affect the people around him or her.

Basically, there are five (5) main characteristics or features of emotional intelligence and these are;

I. Motivation.

II. Self-awareness.

III. Social skills.

IV. Self-regulation.

V. Empathy.

Empathy simply means putting yourself in a person's position, depicting how you will feel if you were in his or her situation. Also, empathy depicts getting the perspective of a thing through another person's lens, eyes or ears.

There are three (3) main types of empathy and these includes;

I. Basic (interchangeable empathy).

II. Additive empathy.

III. Subtractive empathy.

In Subtractive empathy, the counselor responses gives back less (or distorts) than what the client has said.

This ultimately implies that, subtractive empathy requires the counselor using an inappropriate listening or influencing skills.

5 0
2 years ago
Irene establishes a wireless connection between her laptop and smartphone for sharing files. She has created a LANWANPAN, which
stira [4]

Irene created a LAN , which generally uses Ethernet cables for communication.

<h3>What is LAN about?</h3>

The LAN ports are known to be employed to link computers that do not have Wi-Fi access and it is one that make use of an Ethernet cable.

Note that Irene created a LAN , which generally uses Ethernet cables for communication to access the internet.

Learn more about  wireless connection from

brainly.com/question/26956118

#SPJ1

3 0
2 years ago
Other questions:
  • "which part of an information system consists of the rules or guidelines for people to follow?"
    9·1 answer
  • Which of the following is NOT a good idea to do after you change the root password?
    12·1 answer
  • ____ technology essentially takes the data to be transmitted and rather than transmitting it in a fixed bandwidth spreads it ove
    15·1 answer
  • What was the process called that required the photographer to have a tent or darkroom handy so that chemicals could be mixed qui
    7·1 answer
  • Differentiate between trusted-source-security and antispoofing-security techniques.
    10·1 answer
  • Define the following term. data, database, DBMS, database system, data- base catalog, program-data independence, user wen', DBA,
    12·1 answer
  • Betty set up an account on a popular social networking website. she wants to know whether the privacy policy is effective for he
    14·1 answer
  • Number are stored and transmitted inside a computer in the form of​
    6·1 answer
  • Consider the following code segment.
    5·1 answer
  • How many 60 KB jpeg files can be stored on a 2 MB folder in your hard drive?​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!