1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Liono4ka [1.6K]
3 years ago
9

The ________ of the operating system enables the user to communicate with the computer system. Select one:

Computers and Technology
1 answer:
mojhsa [17]3 years ago
8 0
The user interface (correct answer is a)
You might be interested in
_____ is a form of witty, amusing speech that is often used to bring people together.
Neporo4naja [7]

Answer:Informative

Explanation:

5 0
4 years ago
Read 2 more answers
________ is the process of translating a task into a series of commands that a computer will use to perform the task.
IgorC [24]
Programming 
It can also be described as Reverse Engineering 
7 0
4 years ago
At which layer of the osi model is the entire message referred to as the payload
erik [133]

I guess the correct answer is application

An applicatiοn layеr is an abstractiοn layеr that spеcifiеs thе sharеd cοmmunicatiοns prοtοcοls and intеrfacе mеthοds usеd by hοsts in a cοmmunicatiοns nеtwοrk. Thе applicatiοn layеr abstractiοn is usеd in bοth οf thе standard mοdеls οf cοmputеr nеtwοrking: thе Intеrnеt Prοtοcοl Suitе (TCP/IP) and thе ΟSI mοdеl. Althοugh bοth mοdеls usе thе samе tеrm fοr thеir rеspеctivе highеst lеvеl layеr, thе dеtailеd dеfinitiοns and purpοsеs arе diffеrеnt.

6 0
3 years ago
PLEASE HELP!
ss7ja [257]

Explanation:

Case-sensitivity is inherently faster to parse (albeit only slightly) since it can compare character sequences directly without having to figure out which characters are equivalent to each other. It allows the implementer of a class/library to control how casing is used in the code.

3 0
2 years ago
Which security testing activity uses tools that scan for services running on systems? reconnaissance penetration testing network
Fiesta28 [93]

Answer:

Network mapping.

Explanation:

Network mapping seems to be the method of mapping the server visibly and rationally in order to determine the relations at mid of the network as well as the not same nodes.

  • Network mapping is the practice of security checking using software to search against services running on networks.
  • Network performance applications and software contains certain network mapping functions that customize the network
7 0
4 years ago
Other questions:
  • If you have a mix of 32-bit and 64-bit versions of windows, which architectures should you add a unattended installation file fo
    7·1 answer
  • To copy text in a Word document to an Excel spreadsheet, you should first format the text as a Word table or as text separated b
    11·2 answers
  • Your friend sees an error message during Windows startup about a corrupted bootmgr file. He has another computer with a matching
    12·1 answer
  • Technician A says that the ECT and IAT sensors can be tested by using a digital multimeter or a scan tool. Technician B says tha
    12·1 answer
  • Which type of computer operating system would be best for a large corporation?
    7·2 answers
  • A type of touch screen that can be up to four feet by six feet is a(n) _____.
    12·2 answers
  • Controlling access of information on the internet
    15·1 answer
  • The costs incurred when a firm buys on the marketplace what it cannot make itself are referred to as
    6·1 answer
  • The most effective technique of malware propagation among the following list
    7·1 answer
  • SOMEONE PLEASE HELP ME OUT WITH THIS PLEASE
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!