1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
QveST [7]
3 years ago
13

What does enterprise operating system mean?

Computers and Technology
1 answer:
Alla [95]3 years ago
7 0
It means the operating system used in enterprise.
When a corporation needs 100 computers to have OS, it has to order enterprise OS packages from M$.
You might be interested in
When one method calls another, which of the following statements are true?
jonny [76]

Answer:

I. The class methods and instance methods of one class may call the public class methods of another class using dot notation and referencing the name of the other class.

Explanation:

Private methods are being accessed from only within the class or scope specified. No other means of accessibility is possible, and even through inheritance. And instance methods can never call without using dot notation, any of the class method of the same class. Hence second and third options are not correct. And the class method and the instance methods of one class may call the public class methods of another class using the dot notation and referencing the name of the other class. Hence, the correct option is the first one.

3 0
3 years ago
What is mean by sole trading concern?​
DENIUS [597]

Answer:

trading as a whole

Explanation:

pls give brainlest almost lvled up.

6 0
3 years ago
Making phone calls with a public box
AfilCa [17]

Answer:

ja ok it is so eassssy.........................

8 0
3 years ago
Specifically, you will write two policies to ensure web server software and web browsers are secure. Your policy statements will
erik [133]

Answer:

Navigate to Prohibit Software from the Inventory tab. This will list the details of all the software that are already prohibited.

Click Add Prohibited Software. This will open the Add Prohibited Software dialog listing all the software detected in the managed computers. You should have scanned the Windows systems at least once to have the details of the software here.

Select the software that you wish to prohibit and move them to Prohibited List.

Note: In case you have grouped certain software and you are adding that Software

4 0
3 years ago
Why is Resnick skeptical of calling the young people of today ‘digital natives’? Do you agree? Explain.
Nezavi [6.7K]

For question one, Resnick skeptical of calling the young people of today 'digital natives' will have to be agree. For agreeable reasons is because people who are called "digital natives", is because they are in a technological state that they are familiar with. Which means that if young people are in a state of technology and they are really into it, you have this unbreakable string tied to the waist and it hangs into you from a tree.  And for reason two, is because coding can be helpful. In situations like people hacking you, with coding, now that is when it comes in.

And for the others, I'll have to look at some more information I might have. But, here is your first answer is up above, If it isn't good enough, then let me know.

Hope this helps.

~Karleif

3 0
3 years ago
Other questions:
  • When talking about the physical elements of the internet, the term redundancy refers to:?
    13·1 answer
  • The collection of computer instructions and other files that constitute a piece of software is
    9·2 answers
  • What is the output of the following function if the array nums contains the values 1 2 3 4 5 int backwards(int nums[]) { for (x
    15·1 answer
  • What does a cascading style sheet resolve a conflict over rules for an element?
    14·1 answer
  • Witch of the following is a valid why a scientist might a scientific theory
    13·1 answer
  • 2. What is data redundancy?
    14·1 answer
  • 30 points) Suppose you are given a string containing only the characters ( and ). In this problem, you will write a function to
    14·1 answer
  • List any two different between primary memory and secondary memory.​
    8·2 answers
  • Jiz<br>Active<br>2<br>3<br>- 2(7 - 15)<br>What is the value of<br>4​
    10·2 answers
  • Which of the following CANNOT incorporate animation
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!