1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lerok [7]
4 years ago
13

Software that controls a computer. an os controls how system resources are used and provides a user interface, a way of managing

hardware and software, and ways to work with files.
Computers and Technology
1 answer:
nataly862011 [7]4 years ago
4 0
For bad software, probably a virus/malware/ransomware kind of thing. If it is good software, probably a program that organizes your files, adjusts certain things, but do not record your files (no programs are at the top of my head, sorry).
You might be interested in
What are the advantages of using variables in a data type?
mixas84 [53]

Answer:

A variable is a name associated with a data value; we say that the variable "stores" or "contains" the value. Variables allow us to store and manipulate data in our programs.

5 0
3 years ago
You replaced the LCD panel in a laptop computer and verified full system functionality, including wireless connectivity. The cus
Degger [83]

Answer:

There was a mistake in the question. The question included a possible answer. I agreed with the answer given and provide an explanation why I agreed with the answer given.

ANSWER: The laptop's wireless radio is toggled to the off position

Explanation:

Since the laptop technician has verified full system functionality before the customer picked up the item then the problem is likely a setting issue. For the technician to test the wireless connectivity and was satisfied, it means the wireless LAN card was installed and the antennas are working to verify there are no hardware issues. The correct device driver must have been installed as well. Since other users can connect to the WAP it means it is not an external problem. All that is left to check is if the wireless radio is ON or OFF. The customer must have mistakenly toggled the wireless radio OFF and he needs to turn it on in other to connect to the Wireless Access Point.

3 0
3 years ago
Which of the following words, if it replaced the word "enthusiasts" in the sentence above, would CHANGE the meaning of the sente
Sonja [21]

Answer:

I would need the sentence to make sure that I am correct but I am pretty sure it is C. aficionados

Explanation:

7 0
3 years ago
What is the difference between a heap (a minheap) and a binary search tree?
denis-greek [22]

Answer:

Some differences between Heap and Binary search trees are as following:-

A heap is a complete binary tree.While a Binary Search Tree may be  a complete,prefect binary tree.

A minheap the root should be minimum than it's children So it efficient for finding minimum and maximum.While Binary search trees have different properties the root node should be greater than the left child and should be less than the right child.

4 0
3 years ago
Layer 3 of the Transmission Control Protocol/Internet Protocol (TCP/IP) is called the Internet Layer. Describe the functions of
attashe74 [19]

Answer: Internet layer in TCP/IP stack is used for the transmitting and exchanging of information or message between the source and destination in computer systems.The main functions performed by this layer are as follows:-

  • It  transfers the message to the network interface layer
  • The correct information route and destination is established
  • Prefers intelligent routing technique by choosing the shortest route among all paths
  • If any error case of transmission arises then another alternate path for datagram transmission is used.

7 0
3 years ago
Other questions:
  • 2. You have classes to represent different shapes (see below). You realize you can benefit from inheritance and polymorphism by
    13·1 answer
  • To begin importing data from an excel spreadsheet, click on the ____ tab on the ribbon.
    11·1 answer
  • When internet techonology was developed in the 1970s by the department of defense?
    10·1 answer
  • Discuss a situation in which you might want to use a floating-point number with a fractional part for a loop control variable. W
    5·1 answer
  • You have a web application hosted in AWS cloud where the application logs are sent to Amazon CloudWatch. Lately, the web applica
    7·1 answer
  • One form of e-mail attack that is also a DoS attack is called a mail spoof, in which an attacker overwhelms the receiver with ex
    14·1 answer
  • discuss the benefits of normalization, and do you think we should normalize our designs to higher levels than 3NF? Why or why no
    9·1 answer
  • Write a function longer_string() with two string input parameters that returns the string that has more characters in it. If the
    5·1 answer
  • Which of the following is a sign that a website is inappropriate?
    11·2 answers
  • Which technological tool is important for storing critical files?.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!