1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tatiyna
3 years ago
5

Components of an operating system include process,memory,and file management. what is another component of and operating system

Computers and Technology
2 answers:
kirza4 [7]3 years ago
4 0

Answer:

Wrong it's actually C.

Explanation:

APEX

mr_godi [17]3 years ago
4 0

Answer:

Input/Output (I/O) system management APEX Verified

Explanation:

You might be interested in
Note oj cyber security​
dybincka [34]

Answer:

The answer to this question is given below in this explanation section.

Explanation:

                               "cyber security"

cyber security refers to the body of technologies,Processes and practices designed to protect networks,devices,programs and data from attack,damage or unauthorized  access.Cyber security may also be referred to as information technology security.

Importance:

                         Cyber security is important because government financial and medical organization collect process and store unprecedented amounts of data on computer and other devices.A significant portion of that data can be sensitive information,whether that be intellectual property financial data personal information or other type of data for which unauthorized access or exposure could have negative consequences.organizations transmit sensitive data across network and to other devices in the course of doing business,and cyber security describes the discipline dedicated to protecting that information and the systems  use to process or store it.

Challenges of cyber security:

                  For an effective cyber security an organization needs to coordinates its effort throughout its entire information systems.Elements of cyber components all the following:

  • Network security
  • Application security
  • Endpoint security
  • Data security
  • Identity management
  • Database and infrastructure security
  • cloud security
  • Mobile security

Managing cyber security:

            The national cyber security alliance,through recommends a top down  approach to cyber security in which corporate management leads the change in prioritizing cyber security management across all business practices. NCSA advises that companies must be prepaid to response to the inevitable cyber incident restore normal operations,and ensure that company assets and the company reputation are protected.

7 0
3 years ago
Plane eyes I don't know
FrozenT [24]
IFLY is probably what it was.
3 0
3 years ago
While you are working on your computer, it shuts down unexpectedly, and you detect a burning smell. When you remove the case cov
Virty [35]

Answer:

Replace the power supply

Explanation:

Usually, Capacitors burn up because of different factors.

- Exceeding operation voltage

- High Inverse voltage if is an electrolytic capacitor.

A tentative answer could be the battery, but usually the batteries damages are because wear out of them, that is, cycles of charging and discharging, a problem that could arise in the battery is related with the charge protection, this circuit cares that the battery only get the charge that it needs, in Li-po batteries is 3.7V, in some laptops is 24 V, if so the battery could explode or leaking acid.  

The mother-board is the "brain" and the Random Access Memory (RAM), they consume a lot of energy and usually heat up, but doesn’t produce increasing of voltage and its feed it by voltage regulators.

The only valid option is the power supply because the energy comes from a rectifier (made with diodes) and a voltage regulator that step-down the DC voltage output if by any chance the voltage increase or a diode burns up in the power supply the coupling capacitors or input capacitors in the computer will fail.

5 0
3 years ago
When doing a Risk assessment, what is one of the most important things to do?
GaryK [48]

Answer:

Determine who might be harmed and how.

8 0
2 years ago
Read 2 more answers
In a network, a computer that performs specific services for other computers on the network is called a
klio [65]
Motherboard or main sequence processor 
(either that  a mainframe or a server)
hope this helps

8 0
3 years ago
Other questions:
  • How is a network printer identified on the network?
    8·1 answer
  • When transporting data from real-time applications, such as streaming audio and video, which field in the ipv6 header can be use
    12·1 answer
  • Can you block someone on Brainly?
    7·2 answers
  • Which finger types the return or enter key?
    6·2 answers
  • Assume that there is a class called BankAccountHolder that represents an individual member of a bank. There is also a BankAccoun
    5·2 answers
  • You have just starting working at Quantum Company. As a new programmer, you have been asked to review and correct various pseudo
    14·1 answer
  • If you were required to give a speech identifying the risks of using computers and digital devices, which group of items would y
    7·1 answer
  • Define a new class Fighter that inherits from Spaceship. Add a variable property weapon that defaults to an empty string and a v
    14·1 answer
  • (Reverse number) Write a program that prompts the user to enter a four-digit inte- ger and displays the number in reverse order.
    9·1 answer
  • 2
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!