1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MA_775_DIABLO [31]
3 years ago
6

Which of the following is a proprietary OS for desktop and laptop computers?

Computers and Technology
1 answer:
Leni [432]3 years ago
3 0

Answer:

That would be Windows.

Explanation:

If you have any questions feel free to ask in the comments - Mark

Also when you have the chance please mark me brainliest.

You might be interested in
Select the correct answer.
Furkat [3]

Answer:

I think the three and four

3 0
3 years ago
What do we call notes in computer code for the programmer that are ignored by the compiler?.
Lelu [443]

The notes in computer code for the programmer that are ignored by the compiler is called a comment.

<h3>What are codes in programming?</h3>

Codes in programming are specific sequences or sets of instructions that are made for specific programs. They are written in a specific language. They are made to make a human-friendly language. Codes are made after the compiler confirms them.

Comments are written for the document. They tell what the document is for, and how the document is constructed.

Thus, the notes on the computer code for the programmer are called a comment.

To learn more about comments in computer code, refer to the link:

brainly.com/question/18340665

#SPJ4

4 0
1 year ago
Fill in the blanks with the correct words.
viva [34]

Answer:

1) Horizontal

2) Insert

3) Adjustment

4) Cell Style

5) Option-numeric

Explanation:

4 0
2 years ago
Callie Crystal owns and operates one of the most successful local coffee shops in Denver, called The Edgewater Café. Each time a
iris [78.8K]

Answer:

A. Reducing buyer power with a loyalty program

Explanation:

The idea behind buyer power is that buyers can affect the competitive environment for the seller and influence the sellers level of profit. A strong buyer power will pressure sellers to lower price, improve quality and generally offer better services. Buyer power is high when they have any choices and low when they don't have many choices.

One of the ways in which sellers reduces buyer power is through loyalty programs. Loyalty programs are marketing strategies designed in such a way that merchants encourages buyers to continue shopping with them or use product and services associated with them.

What Callie Crystal is doing with her buy 100th cup and recieve a pound of cup of coffee of their choice is her way of reducing buyer power through loyalty programs.

Another method of reducing buyer power is by switching cost.

6 0
2 years ago
Read 2 more answers
Which task manager tab provides details about how a program uses system resources?
almond37 [142]
It will be the performance tab.
8 0
3 years ago
Other questions:
  • Write a Python program that will take as input 5 integer values and will output the average of the odd values and the average of
    6·1 answer
  • The one place where c++ allows aggregate operations on arrays is the input and output of c-strings.
    8·1 answer
  • If you want to write some fancy interface on your computer with expanded communication to the Arduino, what library should you u
    13·1 answer
  • The amount of blank space between each line of text line spacing
    5·1 answer
  • One of the best ways to shoot a picture is to frame the subject in the middle of the screen or viewer. T or F
    14·2 answers
  • 7.) Title text boxes on every slide must be the same format. <br> A. True <br> B. False
    15·2 answers
  • Select the correct word to complete the sentence.
    8·1 answer
  • Any my hero academia fans out there don't report at all just what more friends to
    14·2 answers
  • Explain why computer professionals are engaged in technical services
    14·1 answer
  • a functional policy declares an organization's management direction for security in such specific functional areas as email, rem
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!