1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leno4ka [110]
3 years ago
7

A(n) __________ can include a computer's full operating system, applications, and system settings, including security and config

uration settings.
Computers and Technology
1 answer:
babymother [125]3 years ago
5 0

Solution:

It is done by Operating system.

An Operating system is system software that manages computer hardware and software resources and provides common services for computer programs.

Time-sharing operating systems schedule tasks for efficient use of the system and may also include accounting software for cost allocation of processor time, mass storage, printing, and other resources.

For hardware functions such as input and output and memory allocation, the operating system acts as an intermediary between programs and the computer hardware, although the application code is usually executed directly by the hardware and frequently makes system calls to an OS function or is interrupted by it. Operating systems are found on many devices that contain a computer – from cellular phones and video game consoles to web servers and supercomputers.


You might be interested in
Please help me with these questions please
sp2606 [1]

Answer: i think its 30.

4 0
3 years ago
Which fingers do you use to type the following letters rtgvf
Allushta [10]
Middle,index,index,thumb,middle
3 0
3 years ago
Under normal operations, cisco recommends that you configure switch ports on which vlan
larisa86 [58]

 

You can configure switch ports on default VLAN under normal operations. Cisco switches always have VLAN 1 as the default VLAN, which is required for many decorum communications between switches like spanning-tree protocol for example. It is obligatory not to delete or even change the default VLAN.

 

 





3 0
3 years ago
Medical assistant, Jackie, was downloading some patient information on cerebral palsy from the Internet. While downloading, Jack
lyudmila [28]

The thing that happened is that she has been a victim of system attack and the right thing for Jackie to do is to have an antivirus that can block the malicious  app obstructing her.

<h3>What is a system hack?</h3>

System hacking is known to be when one's computer is said to be compromise in regards to computer systems and software.

Note that The thing that happened is that she has been a victim of system attack and the right thing for Jackie to do is to have an antivirus that can block the malicious  app obstructing her.

Learn more about system hack from

brainly.com/question/13068599

#SPJ1

3 0
2 years ago
While working on a customer issue, your colleague calls and asks for help to resolve his issue. What should you do?A. Go ahead a
Lesechka [4]

Answer:

Request the colleague to call after sometime

Explanation:

While working on a customer issue, your colleague calls and asks for help to resolve his issue. What should be done is to "Request the colleague to call after some time."

This is because,e in situations like that, it is believed that the customer should come first, and that is the purpose of being there. For employee to serve the customer. A colleague can easily link up with other employees to get his issues sorted, or simply wait.

4 0
3 years ago
Other questions:
  • 1. Create a view named customer_addresses that shows the shipping and billing addresses for each customer.
    15·1 answer
  • Need help with this file and due today!!
    6·1 answer
  • Consider the following page reference string:
    12·1 answer
  • What are technology trends in science check all that apply
    13·1 answer
  • How many bits must be "flipped" (i.e., changed from 0 to 1 or from 1 to 0) in order to capitalize a lowercase that’s represented
    13·2 answers
  • A user on a corporate laptop discovers that their bank account and social media accounts have all been hacked. The user has high
    12·1 answer
  • Empty parentheses following a function name in a function definition indicate that the function does not require any parameters
    7·1 answer
  • Does any one know how to do addition of binary numbers​
    6·1 answer
  • Which document outlines the activities carried out during testing?
    9·1 answer
  • All of the salespeople in hyperactive media sales use laptops, so that they can take their applications and data on the road to
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!