1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
trapecia [35]
3 years ago
10

To use the program service routines, the user's program makes requests to the operating system through the

Computers and Technology
1 answer:
Contact [7]3 years ago
8 0
To use the program service routines, the user's program makes requests to the operating system through the application programming interface (API).
API  <span><span>is defined interfaces</span> that specifies how software components interact  with each other and </span><span>between an enterprise and applications that use its assets.</span>




You might be interested in
Write code that generates a random odd integer (not divisible by 2) between 50 and 99 inclusive.
san4es73 [151]

import random

nums = [x for x in range(50,100) if x%2!=0]

print(random.choice(nums))

We use a list comprehension to create a list of the odd numbers between 50 and 99. Then we randomly choose one of those numbers using the random module.

8 0
3 years ago
Input and output devices provide means of communication between computers and outer world<br>​
abruzzese [7]

Answer:

See explanation

Explanation:

This question seem incomplete as what's required was not stated.

To answer this question, I'll assume it's a fill-in-the-gap question

The definition given above describes computer peripherals.

Peripherals is one of the links between a computer user and the computer itself.

Through peripherals such as keyboards, mouse, light pen , one can send input into the computer.

In the same vein, one can get outputs through peripherals such as the computer monitor, speakers, printers, etc.

3 0
3 years ago
Which two settings must you configure when fortigate is being deployed as a root fortigate in a security fabric topology?
Goryan [66]

The two settings that one must configure when fortigate is being deployed as a root fortigate in a security fabric topology are:

  • Option A. Enables you to view the logical and physical topology of Security Fabric devices.
  • Option  C. Enables you to view the security ratings of FortiGate Security Fabric groups.

<h3>What is security fabric settings?</h3>

The term Security Fabric is known to be a tool that aids one or allows one's network to be able to automatically see and also dynamically isolate any kinds of affected devices.

Note that is one that can also partition network segments, update rules, and they can bring out new policies, and delete malware.

Hence, The two settings that one must configure when fortigate is being deployed as a root fortigate in a security fabric topology are:

  • Option A. Enables you to view the logical and physical topology of Security Fabric devices
  • Option  C. Enables you to view the security ratings of FortiGate Security Fabric groups.

See full question below

Which two Security Fabric features are on FortiManager? (Choose two.)

Select one or more:

A. Enables you to view the logical and physical topology of Security Fabric devices

B. Enables you to run security rating on FortiGate devices

C. Enables you to view the security ratings of FortiGate Security Fabric groups

D. Enables you to view and renew Security Fabric licenses for FortiGate devices

Learn more about security from

brainly.com/question/25720881

#SPJ1

8 0
2 years ago
You work for a company that does network cable installations. Your company has been contracted to pull out the existing CAT 3 wi
kicyunya [14]

Answer:

RJ-11 connector.

Explanation:

RJ-11 (Registered Jack-11) also known as the phone line or modem port is a network cable having twisted wire pairs and a modular jack with two, four or six contacts. It is generally used with telephones and modem.

Hence, the other connector type that can be used with CAT 3 installations is the RJ-11 connector.

5 0
4 years ago
This is using python.
Wittaler [7]

Answer:

discriminant = b * b - 4 * a * c

discriminant = b ** 2 - 4 * a * c

Explanation:

The operands are correct and in the right order (for python).

** is the operand for squaring something.

* is the operand for multiplying something.

- is the operand for subtracting something.

8 0
3 years ago
Read 2 more answers
Other questions:
  • When leased computing resources can be increased or decreased​ dynamically, they are said to be​ ________.
    15·2 answers
  • Page _____ refers to whether a page is laid out vertically or horizontally.
    12·1 answer
  • Suppose you are organizing a party for a large group of your friends. Your friends are pretty opinionated, though, and you don't
    14·1 answer
  • Write a program that prompts the user for an integer, then asks the user to enter that many values. Store these values in an arr
    14·1 answer
  • If Digital Assistants are free to use why companies do spend millions of dollars to develop and support them?
    8·1 answer
  • *When a computer programmer is finished writing or developing a program, what has to happen first before the computer can unders
    8·1 answer
  • Water is constantly in motion.<br> True or false
    6·1 answer
  • A _____ is sent to companies that are hiring to get an interview. résumé brochure business report newsletter plz hurry need it n
    13·2 answers
  • A market-product strategy that requires no change in the basic product but instead seeks new buyers is known as ______
    11·1 answer
  • if a user watches a video with event tracking three times in a single session, analytics will count how many unique events?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!