1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Georgia [21]
2 years ago
10

Provide 3to 4 sentence overview of microsoft windows features?

Computers and Technology
1 answer:
Stels [109]2 years ago
6 0

1.is multitasking, multi-user and multithreading operating system.

2.It also supports virtual memory management system to allow multiprogramming.

3.Symmetric multiprocessing allows to it to schedule various tasks on any CPU in a multiprocessor system.

You might be interested in
Input images into a computer
trapecia [35]

Answer:

wepoifj3ifjpoigg5

Explanation:

3ofh3ogo4gh5og

3 0
3 years ago
HELP PLEASE!!!! If you are continually building, reviewing, correcting a model of your system, and incrementally adding to the s
Novosadov [1.4K]

Answer: evolutionary with high fidelity

Explanation:

You are trying to improve the model so that it is able to match any problem. This is evolutionary.

At the same time the model seems to be close to being finalised with all the improvements being made. It is past the design stage and so must be a high fidelity prototype.

6 0
3 years ago
which one of the following would not normally be found in an organization's information security policy?
kotegsom [21]

Requirement to use AES-256 encryption would not normally be found in an organization's information security policy.

When it comes to information security, organizations have a variety of different policies and requirements that they adhere to. One of those requirements is the use of AES-256 encryption.

However, not every organization has AES-256 encryption as a requirement in their information security policy. In fact, many organizations don't even know what AES-256 encryption is.

Why is AES-256 encryption relevant?

Well, AES-256 encryption is a strong form of encryption that is used to protect data. It is often used by governments and organizations to protect sensitive data.

AES-256 encryption is a requirement for many organizations because it provides a high level of security for data. Without AES-256 encryption, data could be compromised.

Learn more about information security policy here:

brainly.com/question/14292882

#SPJ4

4 0
2 years ago
"identify three data types covered in the database programming with sql course."
ankoles [38]

I guess the correct answer is VARCHAR, DATE, CHAR

VARCHAR - Hοlds a variablе lеngth string (can cοntain lеttеrs, numbеrs, and spеcial charactеrs). Thе maximum sizе is spеcifiеd in parеnthеsis. Can stοrе up tο 255 charactеrs.

DATE - A datе. Fοrmat: YYYY-MM-DD

CHAR - Hοlds a fixеd lеngth string (can cοntain lеttеrs, numbеrs, and spеcial charactеrs). Thе fixеd sizе is spеcifiеd in parеnthеsis. Can stοrе up tο 255 charactеrs

6 0
3 years ago
What is one pass of a coding sequence called?​
Romashka-Z-Leto [24]

One pass code is final version of executable file for end user with zero error. While compile the software it give Error it give the list of error to end user further to address the issue.

<u>Explanation:</u>

In computer pass of a code is used in compiler mode of programing languages. Normally end user after completing the software development he or she will compile the software programs.

So as result compiler will  pass code in multiple sequence and make the software as executable file as standalone or execute file which executable software can understanding language.

3 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following best describes a toolbar?
    9·1 answer
  • ____ are model building techniques where computers examine many potential solutions to a problem, iteratively modifying various
    5·1 answer
  • Amanda needs to create an informative print brochure for her local library’s fundraiser dinner. What critical detail must she ha
    14·2 answers
  • Peripheral are used to
    6·1 answer
  • Which of the following are not deducted on a typical pay stub
    12·1 answer
  • Sound can be converted from the electrical energy inside a computer into the mechanical energy of soundwaves in air by using
    9·1 answer
  • In Microsoft Word you can access _ the command to the mini toolbar
    14·2 answers
  • Aarti, a museum employee, has created a table in access titled “Roman Achitecture”. She has included a field that links users im
    8·1 answer
  • You develop an app, and you don’t want anyone to resell it or modify it. This is an example of: A
    5·1 answer
  • Check your knowledge
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!