1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elenna [48]
4 years ago
12

The operating system of a computer is an example of a(n) ________ software.

Computers and Technology
1 answer:
saul85 [17]4 years ago
7 0
Os (operating software) or ISO. For example if your trying to install windows on a new PC without an operating system you would probably burn a ISO file that looks like this (Your operating System).ISO to ether a disk or a USB drive. Hope this helps.
You might be interested in
SOMEONE HELP ME!!!!!
Oliga [24]

Answer:

I don't see the question

Explanation:

5 0
2 years ago
_ ports are audiovisual ports typically used to connect large monitors. These ports are used with many Apple Macintosh computers
cestrela7 [59]

Thunderbolt ports are audiovisual ports typically used to connect large monitors.

<h3>What is a Thunderbolt port?</h3>

A Thunderbolt is known to be used in systems by users. It is one that helps its users to be able to use one cable to have an access to a high-speed and high-resolution media.

This is often done by using one port along with a cable that is able to access both DisplayPort and PCI Express. Thunderbolt is known to contain technology that has been built into it that helps PCI Express speed to come in a good and better way.

Learn more about ports  from

brainly.com/question/10097616

4 0
2 years ago
Select the correct answer. Hudson has to maintain confidential college data in a spreadsheet. He needs two team members to help
AlladinOne [14]

Answer:

B. Protection

Explanation:

It is the protection tab. We can protect a cell from being changed or altered by any other user of the excel sheet using the protection tab. We only need to select the cell, and right-click, Now choose the protection tab, which will be shown. And now select locked and click ok. This cell cannot then be changed by anyone else other than you. Hence, the correct option here is the protection tab.

4 0
3 years ago
Please help guys I'm so lost ​
PilotLPTM [1.2K]

Answer:

The correct answer is C ( W * 5 )

4 0
3 years ago
Read 2 more answers
explain the impact of effectively understanding the various formatting options available in the word processing software applica
Vera_Pavlovna [14]

The formatting tool is very important. When one effectively understands the various formatting options available in the word processing software application, one can be able to;

  • Make more accessible options for readers through creating and use of headings, highlighting key words or ideas etc.

  • Formatting any document helps one to have a  presentable and professional document.

  • It makes the document easier and a lot interesting to read.

  • It helps in Proper punctuation marks and spelling usefulness.

<h3>What is formatting in MS Word?</h3>

Formatting text is simply known as the act of controlling how one wants a particular text to appears in your document. This includes the control of the size, color, etc.

Learn more about word processing software  from

brainly.com/question/1022352

8 0
2 years ago
Other questions:
  • A measure of the twisting or rotational force that an engine can produce is called
    12·1 answer
  • Knowing the meaning of the acronym WYSIWYG can be most helpful to you when you
    14·1 answer
  • What does zooming do? A. Changes your view of the Frame Editor to be closer or farther away B. Changes your view of the Event Ed
    12·1 answer
  • 1. Do you agree that Facebook is the best social media platform to use for interpersonal communication? Why or why not?
    13·2 answers
  • For each of the following application areas state whether or not the tree data structure appears to be a good fit for use as a s
    8·1 answer
  • Kayla wants to know whether she should set her network up as a WAN or a LAN. What are the three questions you would ask her, and
    11·1 answer
  • How many hours do you spend on the Internet per day?
    11·2 answers
  • Outside of a C program, a file is identified by its ________while inside a C program, a file is identified by a(n) ________. fil
    13·1 answer
  • ________ take advantage of vulnerabilities in software. Group of answer choices Blended threats Bots Trojan horses Direct-propag
    6·1 answer
  • True or false. windows server standard edition supports software-defined networking
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!