1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexira [117]
3 years ago
10

Eva is listening to music while she browses the Internet. Which type of operating system must she be using?

Computers and Technology
2 answers:
Fofino [41]3 years ago
8 0
<span>Eva is listening to music while she browses the Internet. Which type of operating system must she be using?

I think the correct answer is

</span>A. a real-time operating system operating system (RTOS)
maks197457 [2]3 years ago
6 0
Eva would be using any modern day OS from Microsoft OS to Macbook OS
You might be interested in
Implement the function is_maxheap which takes a list of integers and returns True if the list represents a valid max-heap, and F
harkovskaia [24]

Answer:

I am writing a Python function:

def is_maxheap(list):

   #finds the length of the list  

   size=len(list)

   #loop has a variable i which starts traversing from root til end of last #internal node

   for i in range(int((size - 2) / 2) + 1):  

       if list[2 * i + 1] > list[i]:  #If left child is greater than its parent then return #false  

               return False  

       if (2 * i + 2 < size and

           list[2 * i + 2] > list[i]):    #checks if right child is greater, if yes then #returns false  

               return False

   return True

Explanation:

The function is_maxheap() traverses through all the internal nodes of the list iteratively. While traversing it checks if the  node is greater than its children or not. To check the working of this function you can write a main() function to check the working on a given list. The main() function has a list of integers. It then calls is_maxheap() method by passing that list to the function. The program displays a message: "valid max heap" if the list represents valid max-heap otherwise it returns invalid max heap.

def main():

   list = [10,7,8]  

   size = len(list)  

   if is_maxheap(list):

       print("Valid Max Heap")  

   else:  

       print("Invalid Max Heap")          

main()

The program along with its output is attached in a screenshot.

5 0
4 years ago
When can screentips be useful? when finding a tab when looking for a command when pinning the ribbon when using a command.
Anettt [7]

Screentips be useful when looking for a command.

<h3>What are Screentips?</h3>

These are referred to small windows which displays descriptive text when the pointer is rested on a command and it is usually done using the mouse.

Screentips is therefore useful when an individual is looking for a command as a result of the information derived from the descriptive texts.

Read more about Screentips here brainly.com/question/18955460

6 0
3 years ago
Which layer of the OSI model defines how to start, control, and end conversations by grouping messages in a workflow
Valentin [98]

Answer:

The session layer defines how to start, control, and end conversations (called sessions). This includes the control and management of multiple bidirectional messages so that the application can be notified if only some of a series of messages are completed.

Explanation:

4 0
3 years ago
Firewalls inspect data transmitted between a computer and external recipients to prevent unsolicited data exchanges.
Bond [772]
True they do prevent unsolicited exchanges by inspecting packets
4 0
3 years ago
When making any change to the database structure, we may need to check for effects of the change on ________.?
IrinaVladis [17]
Data, foreign keys, constraints & triggers .
7 0
4 years ago
Other questions:
  • While creating your résumé, what should you do before making a final copy to fix any typos or errors?
    6·1 answer
  • Every chart has a corresponding ____ that contains the numerical data displayed by the chart.
    6·1 answer
  • What year did Elvis die? Right answer 1977.
    14·1 answer
  • What can an attacker use to capture switch traffic that wouldn't normally be sent to the port the sniffer is attached to?
    5·1 answer
  • Which statement describes the Direction option for animations and transitions?
    5·2 answers
  • Nicole is in a study group to prepare for a test on plant biology, a subject she knows a lot about. During their meetings, she a
    12·2 answers
  • An example of a host-based intrusion detection tool is the tripwire program. This is a file integrity checking tool that scans f
    8·1 answer
  • Refer to the exhibit. What kind of NAT is configured on the ASA device?
    10·1 answer
  • are there any hexadecimal digits that cannot be created using 4 bits? how many bits would you need to represent the hexadecimal
    10·1 answer
  • what is true about the depth of the troposphere? group of answer choices it varies with passing air masses. it is shallower in s
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!